acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Millions of Web Camera, Baby Monitor Feeds Exposed
From ACM TechNews

Millions of Web Camera, Baby Monitor Feeds Exposed

Researchers have identified a vulnerability in a software development kit affecting more than 83 million smart devices.

Levitation: Classic Magic Trick May Enable Quantum Computing
From ACM News

Levitation: Classic Magic Trick May Enable Quantum Computing

A new project will use the electric field in an accelerator cavity to try to levitate a tiny metallic particle, allowing it to store quantum information.

DHS Eyes CMMC Model
From ACM News

DHS Eyes CMMC Model

DHS is working to determine a strategy for implementing "a means of ensuring a contractor has key cybersecurity and cyber hygiene practices in place as a condition...

Google Can Take Two Months to Remove Malware Apps from App Store
From ACM TechNews

Google Can Take Two Months to Remove Malware Apps from App Store

It takes an average of 77 days from detection for Google to remove apps that may contain malware from the Google Play Store, accoriding to a recent analysis.

 Optical Adversarial Attack Can Change the Meaning of Road Signs
From ACM News

Optical Adversarial Attack Can Change the Meaning of Road Signs

An OPtical ADversarial attack uses structured illumination to alter the appearance of target objects, and requires only a commodity projector, a camera, and a computer...

Blockchain Technology Could Be Set for Major Security Boost
From ACM TechNews

Blockchain Technology Could Be Set for Major Security Boost

A team of researchers has strengthened blockchain networks against potential quantum computing threats through the development of a post-quantum cryptographic layer...

Is Your Mobile Provider Tracking Your Location? This Technology Could Stop It.
From ACM TechNews

Is Your Mobile Provider Tracking Your Location? This Technology Could Stop It.

A new system can thwart the tracking of cellphone users by network operators while maintaining seamless connectivity.

Stanford Researchers Use AI to Unlock Extreme Weather Mysteries
From ACM TechNews

Stanford Researchers Use AI to Unlock Extreme Weather Mysteries

New machine-learning approach helps scientists understand increased frequency of extreme precipitation days in the Midwest

Wildfire Simulation Heats Up
From ACM TechNews

Wildfire Simulation Heats Up

Computer simulations can predict the spread of wildfires through sections of a real forest

Researchers Develop Smart-Car Identity and Access Management System
From ACM TechNews

Researchers Develop Smart-Car Identity and Access Management System

Researchers at City, University of London have developed an identity and access management system to make smart cars less vulnerable to cyber attacks.

Security Company Warns of Mitsubishi Industrial Control Vulnerabilities
From ACM TechNews

Security Company Warns of Mitsubishi Industrial Control Vulnerabilities

Researchers at cybersecurity firm Nozomi Networks Labs have identified five vulnerabilities in Mitsubishi's safety programmable logic controllers, centered on the...

'Glowworm Attack' Recovers Audio From Devices' Power LEDs
From ACM TechNews

'Glowworm Attack' Recovers Audio From Devices' Power LEDs

Israeli scientists have demonstrated a novel passive variant of the TEMPEST exploit called Glowworm, which can extract electronic conversations by analyzing devices'...

U.S. Prisons Mull AI to Analyze Inmate Phone Calls
From ACM TechNews

U.S. Prisons Mull AI to Analyze Inmate Phone Calls

The U.S. House Appropriations Committee has asked for a report on using artificial intelligence to analyze prison inmates' phone calls to help prevent violent crime...

Messaging Apps Have an Eavesdropping Problem
From ACM TechNews

Messaging Apps Have an Eavesdropping Problem

Google's Project Zero researcher Natalie Silvanovich found vulnerabilities in messaging apps that add eavesdropping bugs without requiring users to click a malicious...

Novel ASIC Implements Post-Quantum Cryptography
From ACM TechNews

Novel ASIC Implements Post-Quantum Cryptography

Chip efficiently implements post-quantum cryptography to better protect against future hacker attacks using quantum computers

Security Flaws Found in Popular EV Chargers
From ACM TechNews

Security Flaws Found in Popular EV Chargers

Analysts have identified flaws in the application programming interfaces of six home electric vehicle (EV) charging brands, as well as the Chargepoint public EV...

Apple is Prying into iPhones to Find Sexual Predators
From ACM News

Apple is Prying into iPhones to Find Sexual Predators

Privacy activists worry governments could weaponize the feature.

U.S. Taps Tech Giants to Help Fight Ransomware, Cyberattacks
From ACM News

U.S. Taps Tech Giants to Help Fight Ransomware, Cyberattacks

The Department of Homeland Security enlists Amazon, Microsoft, Google and others to help combat cyberthreats.

Microsoft Warns Over Unusual Malware That Targets Windows, Linux
From ACM TechNews

Microsoft Warns Over Unusual Malware That Targets Windows, Linux

Microsoft security researchers are warning customers about the LemonDuck crypto-mining malware that attacks Windows and Linux systems.

Oregon Examines Spyware Investment amid Controversy
From ACM News

Oregon Examines Spyware Investment amid Controversy

The Oregon state employee pension fund is one of the largest investors, if not the largest, in a private equity firm that has majority ownership of NSO Group, the...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account