Sign In

Communications of the ACM

News


An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Hacker Accessed Network of U.S. Agency, Downloaded Data
From ACM TechNews

Hacker Accessed Network of U.S. Agency, Downloaded Data

The U.S. Cybersecurity & Infrastructure Security Agency says an unnamed federal agency has been the victim of a cyberattack in which a hacker accessed its network...

Windows Exploit Lets You Instantly Become Admin. Have You Patched?
From ACM TechNews

Windows Exploit Lets You Instantly Become Admin. Have You Patched?

Zerologon lets anyone with a network toehold obtain the domain-controller password.

Cyber Threat to Disrupt Start of U.K. University Term
From ACM TechNews

Cyber Threat to Disrupt Start of U.K. University Term

The U.K.'s National Cyber Security Center is warning colleges and universities that increasing numbers of cyberattacks threaten to disrupt the start of the Fall...

CISA: Chinese State Hackers Are Exploiting F5, Citrix, Pulse Secure, Exchange Bugs
From ACM TechNews

CISA: Chinese State Hackers Are Exploiting F5, Citrix, Pulse Secure, Exchange Bugs

An advisory from the Cybersecurity and Infrastructure Security Agency (CISA) warns of attacks against U.S. federal networks by hacker groups associated with China's...

Bulletproofing RISC-V Cores
From ACM News

Bulletproofing RISC-V Cores

The RISC-V open standard instruction-set architecture can improve cybersecurity.

Woman Becomes First Healthcare Cyberattack Death
From ACM TechNews

Woman Becomes First Healthcare Cyberattack Death

A woman in Germany suffering a life-threatening illness was the first person to die from a cyberattack on a healthcare system.

The Phish Scale: NIST-Developed Method Helps IT Staff See Why Users Click on Fraudulent Emails
From ACM TechNews

The Phish Scale: NIST-Developed Method Helps IT Staff See Why Users Click on Fraudulent Emails

The Phish Scale could help organizations better train their employees to avoid being deceived by seemingly trustworthy emails.

Most Cybersecurity Reports Only Focus on the Cool Threats
From ACM TechNews

Most Cybersecurity Reports Only Focus on the Cool Threats

A study found just 82 of 629 commercial cybersecurity reports published in the last decade discuss threats to civil society, with the rest devoted to cybercrime...

Millions of WordPress Sites Are Being Probed, Attacked With Recent Plugin Bug
From ACM TechNews

Millions of WordPress Sites Are Being Probed, Attacked With Recent Plugin Bug

Defiant Inc. reports millions of WordPress sites have been attacked by hackers exploiting a zero-day vulnerability in the "File Manager" WordPress plugin.

Malware Gang Uses .NET Library to Generate Excel Docs That Bypass Security Checks
From ACM TechNews

Malware Gang Uses .NET Library to Generate Excel Docs That Bypass Security Checks

Security researchers at NVISO Labs discovered a malware gang is using a .NET library to create malicious Excel files.

Privacy, Blockchain, and IoT--Can We Keep Control of Our Own Identities?
From ACM TechNews

Privacy, Blockchain, and IoT--Can We Keep Control of Our Own Identities?

Research has found privacy issues innate to current blockchain platforms, suggesting the technology requires further refinement for consideration of privacy rights...

With Election Cybersecurity Experts in Short Supply, Some States Call In the National Guard
From ACM TechNews

With Election Cybersecurity Experts in Short Supply, Some States Call In the National Guard

Some U.S. states are asking the National Guard to dispatch cybersecurity experts to fortify their voting systems ahead of the general election in November.

China Launches Initiative to Set Global Data Security Rules
From ACM TechNews

China Launches Initiative to Set Global Data Security Rules

China this week launched the Global Initiative on Data Security, in a bid to establish international data-security standards.

Portland Adopts Landmark Facial Recognition Ordinances
From ACM TechNews

Portland Adopts Landmark Facial Recognition Ordinances

The City Council of Portland, OR, on Wednesday adopted two landmark ordinances barring city and private usage of facial recognition technology.

Kids' Smartwatches a Security Nightmare, Despite Years of Warnings
From ACM TechNews

Kids' Smartwatches a Security Nightmare, Despite Years of Warnings

Researchers at Germany's Münster University of Applied Sciences found smartwatch brands marketed for children are exploitable, based on years of similar findings...

Helping Companies Prioritize Their Cybersecurity Investments
From ACM TechNews

Helping Companies Prioritize Their Cybersecurity Investments

A platform developed by researchers at the Massachusetts Institute of Technology can quantify security risks for companies without requiring them to disclose sensitive...

Computers Can't Cut Red Tape
From ACM News

Computers Can't Cut Red Tape

Modernizing government technology can be helpful during a crisis. To a point.

26-Year-Old is First Woman to Win Africa Prize for Innovation
From ACM TechNews

26-Year-Old is First Woman to Win Africa Prize for Innovation

BACE Group CEO Charlette N'Guessan, 26, is the first woman named to receive the 2020 Royal Academy of Engineering's Africa Prize for Engineering Innovation.

Apple Mistakenly Approved Widely Used Malware to Run on Macs
From ACM TechNews

Apple Mistakenly Approved Widely Used Malware to Run on Macs

Security researchers found that Apple inadvertently passed a well-known form of malware for use on Mac systems through its notarization process.

Apple's Move to Make Advertising Harder on iOS 14 is Part of a Trend
From ACM News

Apple's Move to Make Advertising Harder on iOS 14 is Part of a Trend

Facebook is only the latest developer to feel the squeeze.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account