Sign In

Communications of the ACM

News


An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


UTSA Develops Cyber Agility Framework to Measure Network Protection Over Time
From ACM TechNews

UTSA Develops Cyber Agility Framework to Measure Network Protection Over Time

Researchers have developed what they’re calling the first quantifiable cyber agility framework for scoring hackers and cybersecurity defenders over time.

Stanford Team Aims at Alexa, Siri With Privacy-Minded Alternative
From ACM TechNews

Stanford Team Aims at Alexa, Siri With Privacy-Minded Alternative

Stanford University researchers are designing voice-operated virtual assistants that give users more control over personal information.

Even Voting Machine Company Pushes for Election Security Legislation
From ACM TechNews

Even Voting Machine Company Pushes for Election Security Legislation

Voting machine vendor Election Systems & Software has called on Congress to pass legislation requiring paper trails for all votes to protect against hacking.

Microsoft Wants More Security Researchers to Hack Into Its Cloud
From ACM TechNews

Microsoft Wants More Security Researchers to Hack Into Its Cloud

Microsoft is encouraging security researchers to try hacking its flagship Azure cloud-computing service, so the company can find and correct vulnerabilities.

Computer Virus Has Thrown Philadelphia's Court System Into Chaos
From ACM TechNews

Computer Virus Has Thrown Philadelphia's Court System Into Chaos

A computer virus has crippled Philadelphia's online court system for more than three weeks, raising issues about how cities can respond when essential services...

Image-Recognition Technology May Not Be as Secure as We Think
From ACM TechNews

Image-Recognition Technology May Not Be as Secure as We Think

Evidence is growing that image recognition technology may be more susceptible to deception than previously assumed.

Computer Attack Mimics User's Keystrokes, Evades Detection
From ACM TechNews

Computer Attack Mimics User's Keystrokes, Evades Detection

Researchers have identified a malware technique designed to evade detection via individualized keystroke characteristics.

Microsoft Quietly Deletes Largest Public Face-Recognition Dataset
From ACM TechNews

Microsoft Quietly Deletes Largest Public Face-Recognition Dataset

Microsoft has deleted its MS Celeb dataset from the Internet.

6 Unexpected Places Hackers Can Find Your Information
From ACM News

6 Unexpected Places Hackers Can Find Your Information

Sharing facts like your birthday or your parents' names can open you up to identity theft.

Software Vendor May Have Opened a Gap for Hackers in 2016 Swing State
From ACM News

Software Vendor May Have Opened a Gap for Hackers in 2016 Swing State

A Florida election software company targeted by Russians in 2016 inadvertently opened a potential pathway for hackers to tamper with voter records in North Carolina...

Apple macOS Security Protections Easily Bypassed With 'Synthetic' Clicks, Researcher Finds
From ACM TechNews

Apple macOS Security Protections Easily Bypassed With 'Synthetic' Clicks, Researcher Finds

A researcher found a zero-day vulnerability in a central Apple macOS safeguard, allowing apps or malware to circumvent permissions and access a user's private data...

Solving The Tech Industry's Ethics Problem Could Start In The Classroom
From ACM News

Solving The Tech Industry's Ethics Problem Could Start In The Classroom

Abby Everett Jaques at the Massachusetts Institute of Technologym created a class called Ethics of Technology to help future engineers and computer scientists understand...

Keeping Algorithms Fair
From ACM News

Keeping Algorithms Fair

It's easier to de-bias algorithms than it is to de-bias people.

How Quantum Computer Could Break 2,048-Bit RSA Encryption in 8 Hours
From ACM TechNews

How Quantum Computer Could Break 2,048-Bit RSA Encryption in 8 Hours

Researchers have developed a more efficient technique for decryption calculations by quantum computers.

Vulnerability of Cloud Service Hardware Uncovered
From ACM TechNews

Vulnerability of Cloud Service Hardware Uncovered

Researchers have found that field programmable gate arrays have vulnerabilities that could be exploited by cyber criminals.

Machine Learning Sniffs Out Its Own Machine-Written Propaganda
From ACM TechNews

Machine Learning Sniffs Out Its Own Machine-Written Propaganda

Researchers have modified a neural network to create a natural language processing algorithm that generates, as well as detects, convincing fake articles.

Microsoft Warns Users to Patch as Exploits for 'Wormable' BlueKeep Bug Appear
From ACM TechNews

Microsoft Warns Users to Patch as Exploits for 'Wormable' BlueKeep Bug Appear

Microsoft has published an advisory calling on users to install a patch for a "wormable" vulnerability that could be exploited to launch attacks similar to WannaCry...

Striking First to Beat Hackers at Their Own Game
From ACM News

Striking First to Beat Hackers at Their Own Game

Researchers can use the same covert channels hackers have taken advantage of to protect a vehicle's control systems.

Mainstream Autos Get Driver-Monitoring Devices
From ACM TechNews

Mainstream Autos Get Driver-Monitoring Devices

Hyundai and Subaru unveiled distracted driver alert systems for their mainstream models last month at the New York International Auto Show.

New York School District's Facial Recognition System Sparks Privacy Fears
From ACM TechNews

New York School District's Facial Recognition System Sparks Privacy Fears

The Lockport, NY, city school district launch of a facial recognition system has resulted in some pushback from privacy advocates.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account