As governments crack down on ransomware, cybercriminals may soon shift to business email compromise—already the world's most profitable type of scam.
Wired From ACM News | June 6, 2022
OpenSea, one of the highest-profile crypto start-ups, is facing a backlash over stolen and plagiarized nonfungible tokens.
The New York Times From ACM News | June 6, 2022
Google employees claim a senior researcher fired earlier this year sought to undermine two more junior AI researchers by suggesting their results were wrong or...Wired From ACM News | June 6, 2022
The researchers said they found "several out-of-bound read issues when the NAS handler functions read data from outside the Non-Access Stratum (NAS) message."
The Record From ACM News | June 3, 2022
Oxford High School in Michigan has been testing artificial intelligence-based gun detection software that can flag a firearm carried in plain sight in seconds.
...The Detroit News From ACM TechNews | June 2, 2022
A study of 164 government-endorsed education technology products found 146 endangered children's privacy by collecting and selling their data to ad tech companies...ZDNet From ACM TechNews | June 1, 2022
Threat analysts at HP Wolf Security have discovered a recent malware distribution campaign that uses PDF attachments to transport Word documents with malicious...BleepingComputer From ACM TechNews | May 31, 2022
The SmartCityPHL project in Philadelphia is a partnership of the city, Comcast, and US Ignite to help collect real-time data on air quality, weather, transportation...Government Technology From ACM News | May 26, 2022
The U.S. software company brands itself as "the world's largest facial network" holding billions of face photographs from the Internet.
Euronews From ACM News | May 24, 2022
Researchers found that a bug in Zyxel firewalls that could enable unauthenticated remote attackers to execute code.
ZDNet From ACM TechNews | May 24, 2022
The researchers explored how the vast available knowledge about backdoors in cryptography could be applied to machine learning.
TechTalks From ACM News | May 24, 2022
Sultan Qasim Khan at U.K.-based security firm NCC Group devised an exploit for unlocking Teslas and countless other devices.
Ars Technica From ACM TechNews | May 23, 2022
Researchers have developed a technique for automatically detecting and neutralizing cyberattacks in under a second.
Cardiff University News (U.K.) From ACM TechNews | May 23, 2022
The campaign detailed by a cybersecurity firm highlights Beijing's increasingly sophisticated tactics to spy on an array of targets, including countries it considers...The New York Times From ACM News | May 20, 2022
Researchers at Japan's University of Tokyo trained algorithms on self-blended images to better spot deepfake images and video.
University of Tokyo (Japan) From ACM TechNews | May 20, 2022
Labor shortages have many companies turning to automation technology, but with mixed outcomes.
Logan Kugler From Communications of the ACM | June 1, 2022
Depending on climate conditions, the availability of renewables and other factors, immersion cooling can make a profound difference in both energy consumption and...Samuel Greengard From Communications of the ACM | June 1, 2022
Ohio State University researchers used artificial intelligence to predict how cancer could elevate the probability of spinal fractures by creating digital twins...Ohio State News From ACM TechNews | May 19, 2022