Researchers at French security company NinjaLab found a vulnerability impacting chips used in Google Titan and YubiKey hardware security keys.
ZDNet From ACM TechNews | January 19, 2021
In the U.S., there is no federal system consumers can use to get easy access to their immunization records online and establish their vaccination status for work...The New York Times From ACM News | January 15, 2021
The Defense Digital Service and HackerOne are calling on military and civilian hackers to identify cybersecurity vulnerabilities in the U.S. Army's computer systems...ZDNet From ACM TechNews | January 14, 2021
"Smart cushions" designed by a Chinese technology company and used in office chairs have engendered controversy over privacy and surveillance.
The New York Times From ACM TechNews | January 13, 2021
Cybersecurity firm Check Point found a 45% increase in cyberattacks against the global healthcare sector since November, versus a 22% uptick against all worldwide...ZDNet From ACM TechNews | January 12, 2021
The U.K.'s High Court has ruled that government security and intelligence services cannot use "general warrants" to indiscriminately hack domestic mobile phones...Computer Weekly From ACM TechNews | January 11, 2021
What was described as a controlled test of facial recognition technologies found potential for accurately identifying individuals on security lines at airports...U.S. Department of Homeland Security From ACM TechNews | January 8, 2021
The White House has unveiled a plan to protect the U.S. maritime transportation sector against cybersecurity threats.
The Hill From ACM TechNews | January 8, 2021
Software engineer Tillie Kottmann said Nissan North America's misconfiguration of a Bitbucket Git server led to the online leakage of the automaker’s source code...ZDNet From ACM TechNews | January 8, 2021
Hackers can exploit the Telegram messenger application employed in Android devices and iPhones to pinpoint users' precise locations.
Ars Technica From ACM TechNews | January 7, 2021
A newly discovered malware strain collects an infected user's Basic Service Set Identifier, in order to ascertain the location of the user and their Wi-Fi access...ZDNet From ACM TechNews | January 7, 2021
Niels Teusink, a researcher at Netherlands-based security firm Eye Control, found that hackers are attempting to exploit a backdoor built into several Zyxel device...Ars Technica From ACM TechNews | January 6, 2021
Encrypted identification data on a smartcard or smartphone can deliver significant benefits while boosting security, but raise concerns about privacy and the potential...Samuel Greengard Commissioned by CACM Staff From ACM News | January 5, 2021
Microsoft on Thursday said the Russian exploit of U.S. government agencies and private corporations extended further into its network than previously thought.
The New York Times From ACM TechNews | January 4, 2021
Law enforcement agencies increasingly are using data stored in an automobile's onboard computers to solve crimes.
NBC News From ACM TechNews | January 4, 2021
Apple's lawsuit against security research firm Corellium has failed, with a federal judge rejecting claims that Corellium's software breached copyright law.
The Washington Post From ACM TechNews | January 4, 2021
Apple and Google said they will bar data broker X-Mode Social from culling location information from mobile devices running their operating systems.
The Wall Street Journal From ACM TechNews | December 29, 2020
Researchers found online users are more likely to expose private information based on the structuring of website forms.
Ben-Gurion University of the Negev (Israel) From ACM TechNews | December 28, 2020
Researchers contend Russia's use of North Korean IP addresses for a 2018 cyberattack underscored the need for a new cybersecurity strategy involving selective retaliation...MIT News From ACM TechNews | December 28, 2020