Researchers have identified a vulnerability in a software development kit affecting more than 83 million smart devices.
Wired From ACM TechNews | August 20, 2021
A new project will use the electric field in an accelerator cavity to try to levitate a tiny metallic particle, allowing it to store quantum information.
Thomas Jefferson National Laboratory From ACM News | August 19, 2021
DHS is working to determine a strategy for implementing "a means of ensuring a contractor has key cybersecurity and cyber hygiene practices in place as a condition...Federal Computer Week From ACM News | August 19, 2021
It takes an average of 77 days from detection for Google to remove apps that may contain malware from the Google Play Store, accoriding to a recent analysis.
New Scientist From ACM TechNews | August 19, 2021
An OPtical ADversarial attack uses structured illumination to alter the appearance of target objects, and requires only a commodity projector, a camera, and a computer...Unite.AI From ACM News | August 19, 2021
A team of researchers has strengthened blockchain networks against potential quantum computing threats through the development of a post-quantum cryptographic layer...TechRadar From ACM TechNews | August 17, 2021
A new system can thwart the tracking of cellphone users by network operators while maintaining seamless connectivity.
USC Viterbi School of Engineering From ACM TechNews | August 16, 2021
New machine-learning approach helps scientists understand increased frequency of extreme precipitation days in the MidwestStanford University From ACM TechNews | August 13, 2021
Researchers at City, University of London have developed an identity and access management system to make smart cars less vulnerable to cyber attacks.
City, University of London From ACM TechNews | August 13, 2021
Researchers at cybersecurity firm Nozomi Networks Labs have identified five vulnerabilities in Mitsubishi's safety programmable logic controllers, centered on the...ZDNet From ACM TechNews | August 12, 2021
Israeli scientists have demonstrated a novel passive variant of the TEMPEST exploit called Glowworm, which can extract electronic conversations by analyzing devices'...Ars Technica From ACM TechNews | August 11, 2021
The U.S. House Appropriations Committee has asked for a report on using artificial intelligence to analyze prison inmates' phone calls to help prevent violent crime...Reuters From ACM TechNews | August 11, 2021
Google's Project Zero researcher Natalie Silvanovich found vulnerabilities in messaging apps that add eavesdropping bugs without requiring users to click a malicious...Wired From ACM TechNews | August 10, 2021
Chip efficiently implements post-quantum cryptography to better protect against future hacker attacks using quantum computers
Electronics Weekly From ACM TechNews | August 9, 2021
Analysts have identified flaws in the application programming interfaces of six home electric vehicle (EV) charging brands, as well as the Chargepoint public EV...TechCrunch From ACM TechNews | August 6, 2021
Microsoft security researchers are warning customers about the LemonDuck crypto-mining malware that attacks Windows and Linux systems.
ZDNet From ACM TechNews | August 5, 2021
The Oregon state employee pension fund is one of the largest investors, if not the largest, in a private equity firm that has majority ownership of NSO Group, the...The Washington Post From ACM News | August 5, 2021