Sign In

Communications of the ACM

News


An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Bug in Python Script May Have Affected Hundreds of Studies
From ACM TechNews

Bug in Python Script May Have Affected Hundreds of Studies

A coding error in a set of Python scripts often used for computational analysis of chemistry data yielded significantly different outcomes, depending on which operating...

App Helps You Learn About China, While China Learns All About You
From ACM TechNews

App Helps You Learn About China, While China Learns All About You

Researchers in Germany and Australia found China is using a widely downloaded mobile app and translation service to siphon billions of pieces of information on...

Cybersecurity Giants to Combat Cyberthreats Under OASIS Umbrella
From ACM TechNews

Cybersecurity Giants to Combat Cyberthreats Under OASIS Umbrella

IBM, McAfee, and 16 more firms have launched an effort to address fragmentation and interoperability problems in cybersecurity.

Microsoft Says Iran Tried Hack of U.S. Presidential Campaign
From ACM TechNews

Microsoft Says Iran Tried Hack of U.S. Presidential Campaign

Microsoft says a hacker group connected to the Iranian government has tried to compromise email accounts of a U.S. presidential campaign, current and former U.S...

Encryption System Protects Data from Quantum Computers
From ACM TechNews

Encryption System Protects Data from Quantum Computers

IBM researchers have demonstrated a quantum-proof encryption method called CRYSTALS that can successfully encrypt a magnetic-tap storage device.  

Academics Find Vulnerabilities in Android's VoIP Components
From ACM TechNews

Academics Find Vulnerabilities in Android's VoIP Components

Scientists at China's OPPO ZIWU Cyber Security Lab, the Chinese University of Hong Kong, and Singapore Management University identified eight flaws in Android's...

Decade of Cybersecurity Data Could Predict Future Malicious Online Activity
From ACM TechNews

Decade of Cybersecurity Data Could Predict Future Malicious Online Activity

Researchers have developed a comprehensive dataset of the global cybersecurity threat landscape from 2007 to 2017, to help cybersecurity specialists derive new...

People Are Overconfident About Identifying Phishing Emails
From ACM TechNews

People Are Overconfident About Identifying Phishing Emails

The results of a new study suggest that people may be overconfident in their ability to identify email phishing scams.

Ransomware Forces Hospitals to Turn Away All but Most Critical Patients
From ACM TechNews

Ransomware Forces Hospitals to Turn Away All but Most Critical Patients

Ransomware has crippled hospitals in Alabama and Australia, blocking admission for all but the most critical new patients.

U.S. Steps Up Scrutiny of Airplane Cybersecurity
From ACM TechNews

U.S. Steps Up Scrutiny of Airplane Cybersecurity

The U.S. Department of Homeland Security has revived a program to identify cybersecurity vulnerabilities in aviation, in conjunction with the Pentagon and the U...

Microsoft, MasterCard, Hewlett Foundation Launch Institute to Investigate Cyberattacks
From ACM TechNews

Microsoft, MasterCard, Hewlett Foundation Launch Institute to Investigate Cyberattacks

Microsoft, MasterCard, the Hewlett Foundation, and other organizations have jointly announced the launch of an institute to probe cyberattacks and help their victims...

Lawmakers Warn About Threat of Political Deepfakes by Creating One
From ACM TechNews

Lawmakers Warn About Threat of Political Deepfakes by Creating One

Two U.S. congressmen created an artificial intelligence-doctored political video to demonstrate the threat such disinformation presents.

Decades-Old Code Putting Millions of Critical Devices at Risk
From ACM TechNews

Decades-Old Code Putting Millions of Critical Devices at Risk

Recently discovered vulnerabilities in a nearly 20-year-old industry standard network protocol from Interpeak could potentially make millions of devices exploitable...

PDFex Attack Can Exfiltrate Data from Encrypted PDF Files
From ACM TechNews

PDFex Attack Can Exfiltrate Data from Encrypted PDF Files

Researchers in Germany have developed a new attack that can extract and steal data from encrypted Portable Document Format (PDF)  files, sometimes without user...

High-Tech Sensors May Be Key to Autonomous Cars
From ACM TechNews

High-Tech Sensors May Be Key to Autonomous Cars

Some companies are considering the use of high-tech sensors to address self-driving cars'  limited ability to safely maneuver in traffic and see clearly in all...

Google Draws House Antitrust Scrutiny of Internet Protocol
From ACM TechNews

Google Draws House Antitrust Scrutiny of Internet Protocol

Congressional antitrust investigators are vetting Google's plans to use a new Internet protocol out of worry it could limit competitors' access to consumer data...

Twenty-Seven Countries Sign Cybersecurity Pledge with Digs at China, Russia
From ACM TechNews

Twenty-Seven Countries Sign Cybersecurity Pledge with Digs at China, Russia

Twenty-seven countries signed a joint cybersecurity pledge in a lead-up to the U.N. General Assembly's General Debate last week.

At Least 70 Countries Have Had Disinformation Campaigns, Study Finds
From ACM TechNews

At Least 70 Countries Have Had Disinformation Campaigns, Study Finds

Researchers have found that governments worldwide are stepping up their online disinformation campaigns despite more aggressive regulatory efforts by Internet platforms...

Huawei Suspended From Global Forum Aimed at Combating Cybersecurity Breaches
From ACM TechNews

Huawei Suspended From Global Forum Aimed at Combating Cybersecurity Breaches

Huawei Technologies' membership in the Forum of Incident Response and Security Teams has been suspended.

Hackers Say They Took Over Vote Scanners Like Those Coming to Georgia
From ACM TechNews

Hackers Say They Took Over Vote Scanners Like Those Coming to Georgia

A report from the DEF CON Voting Machine Hacking Village conference described the discovery of a hack for commandeering ballot-scanning machines similar to those...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account