Sign In

Communications of the ACM

News


An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Researchers Disclose Widespread Bootloader Vulnerability
From ACM TechNews

Researchers Disclose Widespread Bootloader Vulnerability

Researchers at enterprise device security company Eclypsium reported a buffer-flow flaw during booting that could potentially compromise billions of Linux and Windows...

EU Sanctions Russian Intelligence, North Korean, Chinese Firms Over Alleged Cyberattacks
From ACM TechNews

EU Sanctions Russian Intelligence, North Korean, Chinese Firms Over Alleged Cyberattacks

The European Union has announced sanctions against the Russian military intelligence service, and North Korean and Chinese companies, for alleged cyberattacks. ...

Mentoring Program Aims to Create Israel's Next Leading Cyber Experts
From ACM TechNews

Mentoring Program Aims to Create Israel's Next Leading Cyber Experts

A national mentoring program in Israel aims to encourage girls currently enrolled in technologically oriented classes in school to pursue positions in the field...

This Tool Could Protect Your Photos From Facial Recognition
From ACM News

This Tool Could Protect Your Photos From Facial Recognition

Researchers at the University of Chicago want you to be able to post selfies without worrying that the next Clearview AI will use them to identify you.

Volunteer Hacker Army Boosts U.S. Election Cybersecurity
From ACM TechNews

Volunteer Hacker Army Boosts U.S. Election Cybersecurity

A University of Chicago program aims to strengthen U.S. election security by enlisting volunteer experts to aid local election officials.

NIST's Post-Quantum Cryptography Program Enters 'Selection Round'
From ACM TechNews

NIST's Post-Quantum Cryptography Program Enters 'Selection Round'

The U.S. National Institute of Standards and Technology initiated the third round of reviewing algorithms submitted to form the core of the first post-quantum cryptography...

Face Masks are Thwarting Even the Best Facial Recognition Algorithms, Study Finds
From ACM News

Face Masks are Thwarting Even the Best Facial Recognition Algorithms, Study Finds

Researchers from the U.S. National Institute of Scence and Technology found that face masks are causing facial recognition algorithms to fail as much as 50% of...

BadPower Attack Corrupts Fast Chargers to Melt or Set Your Device on Fire
From ACM TechNews

BadPower Attack Corrupts Fast Chargers to Melt or Set Your Device on Fire

Chinese security researchers from Tencent's Xuanwu Lab said they can corrupt the firmware of fast chargers to cause damage to the items they charge. The BadPower...

Google Promises Privacy with Virus App but Can Still Collect Location Data
From ACM TechNews

Google Promises Privacy with Virus App but Can Still Collect Location Data

Despite Google's promise that its smartphone software does not track user locations, governments were surprised to learn location-setting must be active for the...

Self-Driving Industry Takes to the Highway After Robotaxi Failure
From ACM TechNews

Self-Driving Industry Takes to the Highway After Robotaxi Failure

FThe autonomous vehicle industry is refocusing on more-profitable opportunities after efforts to commercialize robotaxis failed to live up to the hype.

Blueprint for the Perfect Coronavirus App
From ACM TechNews

Blueprint for the Perfect Coronavirus App

Researchers have outlined the ethical and legal challenges of developing and implementing digital tools for managing the Covid-19 pandemic.

Neuromorphic Chips Take Shape
From Communications of the ACM

Neuromorphic Chips Take Shape

Chips designed specifically to model the neurons and synapses in the human brain are poised to change computing in profound ways.

Digital Humans on the Big Screen
From Communications of the ACM

Digital Humans on the Big Screen

Motion pictures are using new techniques in computer-generated imagery to create feature-length performances by convincingly "de-aged" actors.

Are We Addicted to Technology?
From Communications of the ACM

Are We Addicted to Technology?

Experts agree technology causes some negative behaviors, but they are divided on how bad the problem is.

A Tool for Hardening Java Crypto
From ACM News

A Tool for Hardening Java Crypto

A new tool identifies cryptographic vulnerabilities in Java (and soon, in Python) automatically.

Tracking Misinformation Campaigns in Real-Time Is Possible, Study Shows
From ACM News

Tracking Misinformation Campaigns in Real-Time Is Possible, Study Shows

The researchers hope software engineers will be able to build on their work to create a real-time monitoring system for exposing foreign influence in American politics...

Google Promises Privacy With Virus App but Can Still Collect Location Data
From ACM News

Google Promises Privacy With Virus App but Can Still Collect Location Data

Some government agencies that use the software said they were surprised Google may pick up the locations of certain app users. Others said they had unsuccessfully...

Predicting Cyberattacks
From ACM News

Predicting Cyberattacks

A growing number of researchers are focusing on being more proactive in predicting and preventing cyberattacks, rather than reactively fixing problems later.

Deepfake Used to Attack Activist Couple Shows New Disinformation Frontier
From ACM TechNews

Deepfake Used to Attack Activist Couple Shows New Disinformation Frontier

A student at the U.K.'s University of Birmingham has been unmasked as fictional by state-of-the-art forensic analysis programs from Israel-based startup Cyabra....

U.K. Government Test-and-Trace Program Illegal under GDPR
From ACM News

U.K. Government Test-and-Trace Program Illegal under GDPR

The government skipped essential data privacy impact assessments in its rush to get the system up and running.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account