Cybersecurity firm Palo Alto Networks found that 83% of Internet-linked imaging devices in hospitals use outdated software containing known bugs that hackers can...CNet From ACM TechNews | March 19, 2020
A team of computer scientists in France and the U.S. has set a record for integer factorization, a major challenge in the security of most public key cryptography...University of California San Diego Jacobs School of Engineering From ACM TechNews | March 16, 2020
The Congressional Cyberspace Solarium Commission report on the state of cybersecurity in the U.S. included sweeping recommendations for shoring up cyberdefense....Politico From ACM TechNews | March 16, 2020
Information technology security experts assessing personal identification numbers codes for securing smartphones found six-digit PINs offer little more security...Ruhr-University Bochum (Germany) From ACM TechNews | March 13, 2020
Extensive mitigations deployed during the last six years have failed to eliminate modern random-access memory (RAM) cards' vulnerability to Rowhammer exploits.
...ZDNet From ACM TechNews | March 13, 2020
Researchers said Chinese social media platforms censored keywords related to the coronavirus outbreak as early as December, potentially limiting the Chinese public's...Financial Times From ACM TechNews | March 12, 2020
Researchers found previously unknown vulnerabilities in encryption systems used by in-vehicle devices that communicate at close range with key fobs to unlock the...Wired From ACM TechNews | March 9, 2020
Researchers have developed an approach to protect Army systems from attack in ways that don't require massive amounts of manual intervention.
U.S. Army Research Laboratory From ACM TechNews | March 6, 2020
Researchers at Slovakian Internet security company ESET discovered that billions of devices are affected by a Wi-Fi vulnerability that allows nearby attackers to...Ars Technica From ACM TechNews | March 2, 2020
A multi-institutional collaboration has demonstrated a "surfing attack" that uses ultrasonic waves to hijack voice-recognition systems on cellphones, including...The Source (Washington University in St. Louis) From ACM TechNews | February 28, 2020