Sign In

Communications of the ACM

News


An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


NIST's Post-Quantum Cryptography Program Enters 'Selection Round'
From ACM TechNews

NIST's Post-Quantum Cryptography Program Enters 'Selection Round'

The U.S. National Institute of Standards and Technology initiated the third round of reviewing algorithms submitted to form the core of the first post-quantum cryptography...

Face Masks are Thwarting Even the Best Facial Recognition Algorithms, Study Finds
From ACM News

Face Masks are Thwarting Even the Best Facial Recognition Algorithms, Study Finds

Researchers from the U.S. National Institute of Scence and Technology found that face masks are causing facial recognition algorithms to fail as much as 50% of...

BadPower Attack Corrupts Fast Chargers to Melt or Set Your Device on Fire
From ACM TechNews

BadPower Attack Corrupts Fast Chargers to Melt or Set Your Device on Fire

Chinese security researchers from Tencent's Xuanwu Lab said they can corrupt the firmware of fast chargers to cause damage to the items they charge. The BadPower...

Google Promises Privacy with Virus App but Can Still Collect Location Data
From ACM TechNews

Google Promises Privacy with Virus App but Can Still Collect Location Data

Despite Google's promise that its smartphone software does not track user locations, governments were surprised to learn location-setting must be active for the...

Self-Driving Industry Takes to the Highway After Robotaxi Failure
From ACM TechNews

Self-Driving Industry Takes to the Highway After Robotaxi Failure

FThe autonomous vehicle industry is refocusing on more-profitable opportunities after efforts to commercialize robotaxis failed to live up to the hype.

Blueprint for the Perfect Coronavirus App
From ACM TechNews

Blueprint for the Perfect Coronavirus App

Researchers have outlined the ethical and legal challenges of developing and implementing digital tools for managing the Covid-19 pandemic.

A Tool for Hardening Java Crypto
From ACM News

A Tool for Hardening Java Crypto

A new tool identifies cryptographic vulnerabilities in Java (and soon, in Python) automatically.

Tracking Misinformation Campaigns in Real-Time Is Possible, Study Shows
From ACM News

Tracking Misinformation Campaigns in Real-Time Is Possible, Study Shows

The researchers hope software engineers will be able to build on their work to create a real-time monitoring system for exposing foreign influence in American politics...

Google Promises Privacy With Virus App but Can Still Collect Location Data
From ACM News

Google Promises Privacy With Virus App but Can Still Collect Location Data

Some government agencies that use the software said they were surprised Google may pick up the locations of certain app users. Others said they had unsuccessfully...

Predicting Cyberattacks
From ACM News

Predicting Cyberattacks

A growing number of researchers are focusing on being more proactive in predicting and preventing cyberattacks, rather than reactively fixing problems later.

Deepfake Used to Attack Activist Couple Shows New Disinformation Frontier
From ACM TechNews

Deepfake Used to Attack Activist Couple Shows New Disinformation Frontier

A student at the U.K.'s University of Birmingham has been unmasked as fictional by state-of-the-art forensic analysis programs from Israel-based startup Cyabra....

U.K. Government Test-and-Trace Program Illegal under GDPR
From ACM News

U.K. Government Test-and-Trace Program Illegal under GDPR

The government skipped essential data privacy impact assessments in its rush to get the system up and running.

A Hacker Used Twitter's Own 'Admin' Tool to Spread Cryptocurrency Scam
From ACM TechNews

A Hacker Used Twitter's Own 'Admin' Tool to Spread Cryptocurrency Scam

A hacker this week accessed an "admin" tool on Twitter to commandeer prominent Twitter accounts to spread a cryptocurrency scam, according to a person with direct...

This Device Keeps Voice Assistants From Snooping on You
From ACM TechNews

This Device Keeps Voice Assistants From Snooping on You

An international team of researchers  has developed a Raspberry Pi-based device that eventually may be able to warn users when Amazon's Alexa and other voice assistants...

A Brazen Online Attack Targets V.I.P. Twitter Users in a Bitcoin Scam
From ACM News

A Brazen Online Attack Targets V.I.P. Twitter Users in a Bitcoin Scam

In a major show of force, hackers breached some of the site's most prominent accounts, a Who's Who of Americans in politics, entertainment and tech.

Tech to Contain Coronavirus on College Campuses Sparks Fresh Privacy Concerns
From ACM TechNews

Tech to Contain Coronavirus on College Campuses Sparks Fresh Privacy Concerns

U.S. colleges are racing to contain the Covid-19 pandemic with technology including contact-tracing applications and facial recognition, prompting concerns about...

Phishing Attacks: This Sophisticated Group Has Been Operating Undiscovered for at Least a Year
From ACM TechNews

Phishing Attacks: This Sophisticated Group Has Been Operating Undiscovered for at Least a Year

Cybersecurity researchers found a new phishing group targeting large companies worldwide, which may have been operating undiscovered for over a year.

Filter Protects Against Deepfake Photos, Videos
From ACM TechNews

Filter Protects Against Deepfake Photos, Videos

Computer scientists at Boston University have created an algorithm that prevents deepfakes by adding an imperceptible filter to videos and photos before they are...

Google Fixes Smartwatch Security Problem
From ACM TechNews

Google Fixes Smartwatch Security Problem

Google corrected a security vulnerability in its Wear OS smartwatches that could have allowed attackers to crash applications, render the app or the watch unresponsive...

National Security Agency Warns That VPNs Could Be Vulnerable to Cyberattacks
From ACM TechNews

National Security Agency Warns That VPNs Could Be Vulnerable to Cyberattacks

A cybersecurity advisory issued by the National Security Agency's Cybersecurity Directorate warns that virtual private networks may be vulnerable to cyberattacks...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account