Daniel A. Spielman and colleague Shang-hua Teng solved the mystery of the Simplex Method using a technique called smoothed analysis…
From ACM NewsAllyn Jackson Commissioned by CACM Staff| January 31, 2023
An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.
Internet of Things security firm Forescout uncovered 33 flaws in seven open source TCP/IP stacks that potentially leave millions of IoT devices vulnerable.
Wired From ACM TechNews | December 9, 2020
Researchers found they could stop a Tesla by flashing a few frames of a stop sign for less than half a second on an Internet-connected billboard.
Wired From ACM News | October 20, 2020
Researchers at Israel's Ben Gurion University of the Negev found they could fool Tesla's Autopilot driver-assistance systems into automatically reacting without...Wired From ACM TechNews | October 14, 2020
The Cyber Threat Intelligence League aims to protect hospitals and health systems around the world from cyberattacks as they deal with Covid-19 cases.
Wired From ACM TechNews | October 6, 2020
Researchers at Germany's Münster University of Applied Sciences found smartwatch brands marketed for children are exploitable, based on years of similar findings...Wired From ACM TechNews | September 11, 2020
Researchers have developed a long-distance eavesdropping method that exploits vibrations on the glass surface of a light bulb's interior.
Wired From ACM TechNews | June 17, 2020
At 22, he single-handedly put a stop to the worst cyberattack the world had ever seen. Then he was arrested by the FBI. This is his untold story.
Wired From ACM News | May 12, 2020
Researchers found previously unknown vulnerabilities in encryption systems used by in-vehicle devices that communicate at close range with key fobs to unlock the...Wired From ACM TechNews | March 9, 2020
Sixty years ago, a sharecropper's son invented a technology to identify faces. Then the record of his role all but vanished.
Wired From ACM News | February 3, 2020
Intel said it will release yet another patch for a microarchitectural data sampling vulnerability that allows hackers to fool microprocessors into exposing protected...Wired From ACM TechNews | January 29, 2020
A new attack called Plundervolt gives attackers access to the sensitive data stored in a processor's secure enclave.
Wired From ACM News | December 11, 2019
Recently discovered vulnerabilities in a nearly 20-year-old industry standard network protocol from Interpeak could potentially make millions of devices exploitable...Wired From ACM TechNews | October 2, 2019
Israeli cybersecurity firms Check Point and Intezer have charted Russian hackers' toolkits from wide-ranging analysis of 2,500 malware samples.
Wired From ACM TechNews | September 25, 2019
By releasing its homegrown differential privacy tool, Google will make it easier for any company to boost its privacy bona fides.
Wired From ACM News | September 6, 2019
Google researchers discovered thousands of iPhones have been compromised with sophisticated spyware over the last two years, contradicting assumptions about the...Wired From ACM TechNews | September 5, 2019
The threat of cyberwar looms over the future: a new dimension of conflict capable of leapfrogging borders and teleporting the chaos of war to civilians thousands...Wired From ACM News | August 26, 2019
For the past four years, Facebook has quietly used a homegrown tool called Zoncolan to find bugs in its massive codebase.
Wired From ACM News | August 19, 2019
Hackers can exploit vulnerabilities in the Zoom videoconferencing desktop app to commandeer a user's Webcam, a security researcher warns.
Wired From ACM TechNews | July 16, 2019