Security researchers have identified malware customized to run on Apple's new M1 processors in the MacBook Pro, MacBook Air, and Mac Mini computers.
Wired From ACM TechNews | February 22, 2021
Internet of Things security firm Forescout uncovered 33 flaws in seven open source TCP/IP stacks that potentially leave millions of IoT devices vulnerable.
Wired From ACM TechNews | December 9, 2020
Researchers found they could stop a Tesla by flashing a few frames of a stop sign for less than half a second on an Internet-connected billboard.
Wired From ACM News | October 20, 2020
Researchers at Israel's Ben Gurion University of the Negev found they could fool Tesla's Autopilot driver-assistance systems into automatically reacting without...Wired From ACM TechNews | October 14, 2020
The Cyber Threat Intelligence League aims to protect hospitals and health systems around the world from cyberattacks as they deal with Covid-19 cases.
Wired From ACM TechNews | October 6, 2020
Researchers at Germany's Münster University of Applied Sciences found smartwatch brands marketed for children are exploitable, based on years of similar findings...Wired From ACM TechNews | September 11, 2020
Researchers have developed a long-distance eavesdropping method that exploits vibrations on the glass surface of a light bulb's interior.
Wired From ACM TechNews | June 17, 2020
At 22, he single-handedly put a stop to the worst cyberattack the world had ever seen. Then he was arrested by the FBI. This is his untold story.
Wired From ACM News | May 12, 2020
Researchers found previously unknown vulnerabilities in encryption systems used by in-vehicle devices that communicate at close range with key fobs to unlock the...Wired From ACM TechNews | March 9, 2020
Sixty years ago, a sharecropper's son invented a technology to identify faces. Then the record of his role all but vanished.
Wired From ACM News | February 3, 2020
Intel said it will release yet another patch for a microarchitectural data sampling vulnerability that allows hackers to fool microprocessors into exposing protected...Wired From ACM TechNews | January 29, 2020
A new attack called Plundervolt gives attackers access to the sensitive data stored in a processor's secure enclave.
Wired From ACM News | December 11, 2019
Recently discovered vulnerabilities in a nearly 20-year-old industry standard network protocol from Interpeak could potentially make millions of devices exploitable...Wired From ACM TechNews | October 2, 2019
Israeli cybersecurity firms Check Point and Intezer have charted Russian hackers' toolkits from wide-ranging analysis of 2,500 malware samples.
Wired From ACM TechNews | September 25, 2019
By releasing its homegrown differential privacy tool, Google will make it easier for any company to boost its privacy bona fides.
Wired From ACM News | September 6, 2019
Google researchers discovered thousands of iPhones have been compromised with sophisticated spyware over the last two years, contradicting assumptions about the...Wired From ACM TechNews | September 5, 2019
The threat of cyberwar looms over the future: a new dimension of conflict capable of leapfrogging borders and teleporting the chaos of war to civilians thousands...Wired From ACM News | August 26, 2019
For the past four years, Facebook has quietly used a homegrown tool called Zoncolan to find bugs in its massive codebase.
Wired From ACM News | August 19, 2019
Hackers can exploit vulnerabilities in the Zoom videoconferencing desktop app to commandeer a user's Webcam, a security researcher warns.
Wired From ACM TechNews | July 16, 2019