Polkit, a system-wide privilege manager for Unix-like operating systems, contains a 12-year-old memory-corruption vulnerability.
Ars Technica From ACM TechNews | January 31, 2022
An extensive digital privacy law aimed to give internet users more control over their data. Instead, experts say, it's created "almost a useless exercise."
The New York Times From ACM News | January 31, 2022
Crypto prices are highly volatile, but die-hard enthusiasts believe prices will keep soaring in a world where traditional notions of value don't apply.
The New York Times From ACM News | January 31, 2022
Security researchers have uncovered macOS malware that can be installed by exploits almost impossible for most users to detect.
Ars Technica From ACM TechNews | January 28, 2022
By this summer, Americans wanting to access their Internal Revenue Service records online will be required to submit a facial video to confirm their identity.
The Washington Post From ACM TechNews | January 28, 2022
Andorra Telecom experienced repeated distributed denial-of-service attacks during the SquidCraft Games tournament in Minecraft, a multi-day Twitch gaming tournament...Tom's Hardware From ACM TechNews | January 27, 2022
A war game and study by a think tank illustrate how dependent the world is on Taiwan's semiconductor foundries.
The New York Times From ACM News | January 27, 2022
Apple awarded a $100,500 bug bounty to the researcher who discovered the latest major vulnerability in its browser.
Wired From ACM News | January 27, 2022
This is the first global standard to measure and verify supplier strust, and to protect digital infrastructure.
Telecommunications Industry Association From ACM News | January 26, 2022
Seoul-based news site NK Pro reported that log files and network records showed Websites on North Korean Web domains were largely unreachable.
Reuters From ACM News | January 26, 2022
The 2022 State of Healthcare IoT Device Security Report estimates 53% of medical devices in hospitals connected to the Internet of Things have critical flaws.
ZDNet From ACM TechNews | January 21, 2022
There's been growth in cheap, easy-to-use malware available to hackers who want to steal cryptocurrency from users.
ZDNet From ACM News | January 21, 2022
Researchers have found that electrical vehicle charging stations and their Internet-based management systems are vulnerable to cybersecurity attacks.
University of Texas at San Antonio From ACM TechNews | January 20, 2022
The malware was revealed as Russian troops remained massed at the Ukrainian border, and after Ukrainian government agencies had their websites defaced.
The New York Times From ACM News | January 18, 2022
Parking enforcement officers recently found fake quick response code stickers on pay stations in three Texas cities, used to trick people into paying scammers.
...Ars Technica From ACM TechNews | January 18, 2022
The updates cause Windows domain controllers enter a boot loop, with servers getting into an endless cycle of Windows starting and then rebooting after a few minutes...BleepingComputer From ACM News | January 13, 2022
A computer model developed by Tufts University researchers can mimic the real-life spread of misinformation to expose its mechanisms and help in the development...Tufts Now From ACM TechNews | January 12, 2022