An alliance of Chinese government groups, banks, and technology firms plans to launch one of the first blockchain networks constructed and maintained by a central...IEEE Spectrum From ACM TechNews | March 23, 2020
Cybersecurity firm Palo Alto Networks found that 83% of Internet-linked imaging devices in hospitals use outdated software containing known bugs that hackers can...CNet From ACM TechNews | March 19, 2020
A team of computer scientists in France and the U.S. has set a record for integer factorization, a major challenge in the security of most public key cryptography...University of California San Diego Jacobs School of Engineering From ACM TechNews | March 16, 2020
The Congressional Cyberspace Solarium Commission report on the state of cybersecurity in the U.S. included sweeping recommendations for shoring up cyberdefense....Politico From ACM TechNews | March 16, 2020
Information technology security experts assessing personal identification numbers codes for securing smartphones found six-digit PINs offer little more security...Ruhr-University Bochum (Germany) From ACM TechNews | March 13, 2020
Extensive mitigations deployed during the last six years have failed to eliminate modern random-access memory (RAM) cards' vulnerability to Rowhammer exploits.
...ZDNet From ACM TechNews | March 13, 2020
Researchers said Chinese social media platforms censored keywords related to the coronavirus outbreak as early as December, potentially limiting the Chinese public's...Financial Times From ACM TechNews | March 12, 2020
Researchers found previously unknown vulnerabilities in encryption systems used by in-vehicle devices that communicate at close range with key fobs to unlock the...Wired From ACM TechNews | March 9, 2020
Researchers have developed an approach to protect Army systems from attack in ways that don't require massive amounts of manual intervention.
U.S. Army Research Laboratory From ACM TechNews | March 6, 2020