acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Bug Lurking for 12 Years Gives Attackers Root on Most Major Linux Distros
From ACM TechNews

Bug Lurking for 12 Years Gives Attackers Root on Most Major Linux Distros

Polkit, a system-wide privilege manager for Unix-like operating systems, contains a 12-year-old memory-corruption vulnerability.

How Cookie Banners Backfired
From ACM News

How Cookie Banners Backfired

An extensive digital privacy law aimed to give internet users more control over their data. Instead, experts say, it's created "almost a useless exercise."

It's Hard to Tell When the Crypto Bubble Will Burst, or If There Is One
From ACM News

It's Hard to Tell When the Crypto Bubble Will Burst, or If There Is One

Crypto prices are highly volatile, but die-hard enthusiasts believe prices will keep soaring in a world where traditional notions of value don't apply.

Booby-Trapped Sites Delivered Potent Backdoor Trojan to macOS Users
From ACM TechNews

Booby-Trapped Sites Delivered Potent Backdoor Trojan to macOS Users

Security researchers have uncovered macOS malware that can be installed by exploits almost impossible for most users to detect.

IRS Wants to Scan Your Face
From ACM TechNews

IRS Wants to Scan Your Face

By this summer, Americans wanting to access their Internal Revenue Service records online will be required to submit a facial video to confirm their identity.

Minecraft DDoS Attack Leaves Small European Country Without Internet
From ACM TechNews

Minecraft DDoS Attack Leaves Small European Country Without Internet

Andorra Telecom experienced repeated distributed denial-of-service attacks during the SquidCraft Games tournament in Minecraft, a multi-day Twitch gaming tournament...

The Administration Wants to Prevent an Attack on Water Supplies
From ACM News

The Administration Wants to Prevent an Attack on Water Supplies

New water cybersecurity standards are coming – but they're voluntary.

How the Computer Chip Shortage Could Incite a U.S. Conflict With China
From ACM News

How the Computer Chip Shortage Could Incite a U.S. Conflict With China

A war game and study by a think tank illustrate how dependent the world is on Taiwan's semiconductor foundries.

Safari Flaws Exposed Webcams, Online Accounts, More
From ACM News

Safari Flaws Exposed Webcams, Online Accounts, More

Apple awarded a $100,500 bug bounty to the researcher who discovered the latest major vulnerability in its browser.

New Supply Chain Security Standard for ICT
From ACM News

New Supply Chain Security Standard for ICT

This is the first global standard to measure and verify supplier strust, and to protect digital infrastructure.

North Korean Internet Downed by Suspected Cyberattacks: Researchers
From ACM News

North Korean Internet Downed by Suspected Cyberattacks: Researchers

Seoul-based news site NK Pro reported that log files and network records showed Websites on North Korean Web domains were largely unreachable.

The Rise of A.I. Fighter Pilots
From ACM News

The Rise of A.I. Fighter Pilots

Artificial intelligence is being taught to fly warplanes. Can the technology be trusted?

Amazon Opening 30,000-Sq.-Ft. Store with QR Codes, Palm-Scanning Checkout
From ACM TechNews

Amazon Opening 30,000-Sq.-Ft. Store with QR Codes, Palm-Scanning Checkout

Amazon will open a 30,000-sq.-ft. clothing store in Los Angeles later this year.

More Than Half of Medical Devices Have Critical Vulnerabilities
From ACM TechNews

More Than Half of Medical Devices Have Critical Vulnerabilities

The 2022 State of Healthcare IoT Device Security Report estimates 53% of medical devices in hospitals connected to the Internet of Things have critical flaws.

Cheap Malware Behind Rise in Attacks on Cryptocurrency Wallets
From ACM News

Cheap Malware Behind Rise in Attacks on Cryptocurrency Wallets

There's been growth in cheap, easy-to-use malware available to hackers who want to steal cryptocurrency from users.

UTSA Researchers Help Protect EV Charging Stations from Cyberattacks
From ACM TechNews

UTSA Researchers Help Protect EV Charging Stations from Cyberattacks

Researchers have found that electrical vehicle charging stations and their Internet-based management systems are vulnerable to cybersecurity attacks.

Microsoft Warns of Destructive Cyberattack on Ukrainian Computer Networks
From ACM News

Microsoft Warns of Destructive Cyberattack on Ukrainian Computer Networks

The malware was revealed as Russian troops remained massed at the Ukrainian border, and after Ukrainian government agencies had their websites defaced.

Scammers Put Fake QR Codes on Parking Meters to Intercept Payments
From ACM TechNews

Scammers Put Fake QR Codes on Parking Meters to Intercept Payments

Parking enforcement officers recently found fake quick response code stickers on pay stations in three Texas cities, used to trick people into paying scammers. ...

New Windows Server Updates Cause DC Boot Loops, Break Hyper-V
From ACM News

New Windows Server Updates Cause DC Boot Loops, Break Hyper-V

The updates cause Windows domain controllers enter a boot loop, with servers getting into an endless cycle of Windows starting and then rebooting after a few minutes...

Computer Model Seeks to Explain Spread of Misinformation, Suggests Countermeasures
From ACM TechNews

Computer Model Seeks to Explain Spread of Misinformation, Suggests Countermeasures

A computer model developed by Tufts University researchers can mimic the real-life spread of misinformation to expose its mechanisms and help in the development...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account