acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
dateMore Than a Year Ago
subjectSecurity
authorZDNet
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Lygon Blockchain Platform Mints Digital Bank Guarantee
From ACM TechNews

Lygon Blockchain Platform Mints Digital Bank Guarantee

A new blockchain platform named Lygon, formed by Australian banks ANZ, the Commonwealth Bank of Australia, and Westpac, IBM, and shopping center company Scentre...

Blockchain Transactions Confirm Murky, Interconnected Ransomware Scene
From ACM TechNews

Blockchain Transactions Confirm Murky, Interconnected Ransomware Scene

A study by blockchain investigations firm Chainalysis found that cybercrime gangs often switch ransomware-as-a-service suppliers as they seek better profits.

Apple Fixes Another 3 iOS Zero-Days Exploited in the Wild
From ACM TechNews

Apple Fixes Another 3 iOS Zero-Days Exploited in the Wild

Apple has released patches for three iOS zero-day vulnerabilities.

DNSpooq Lets Attackers Poison DNS Cache Records
From ACM TechNews

DNSpooq Lets Attackers Poison DNS Cache Records

Researchers have uncovered seven vulnerabilities that affect Dnsmasq, a domain name system forwarding client for *NIX-based operating systems.

Fake Collaboration Apps Steal Data as Staff Struggle with Home-Working Security
From ACM TechNews

Fake Collaboration Apps Steal Data as Staff Struggle with Home-Working Security

According to cybersecurity company Wandera's Cloud Security Report 2021, malware attacks increasingly targeted remote workers last year.

Side-Channel Attack Can Recover Encryption Keys From Google Titan Security Keys
From ACM TechNews

Side-Channel Attack Can Recover Encryption Keys From Google Titan Security Keys

Researchers at French security company NinjaLab found a vulnerability impacting chips used in Google Titan and YubiKey hardware security keys.

Hack the Army Bug Bounty Challenge Asks Hackers to Find Vulnerabilities in Military Networks
From ACM TechNews

Hack the Army Bug Bounty Challenge Asks Hackers to Find Vulnerabilities in Military Networks

The Defense Digital Service and HackerOne are calling on military and civilian hackers to identify cybersecurity vulnerabilities in the U.S. Army's computer systems...

As Coronavirus Cases Surge, So Do Cyberattacks Against the Healthcare Sector
From ACM TechNews

As Coronavirus Cases Surge, So Do Cyberattacks Against the Healthcare Sector

Cybersecurity firm Check Point found a 45% increase in cyberattacks against the global healthcare sector since November, versus a 22% uptick against all worldwide...

Nissan Source Code Leaked Online After Git Repo Misconfiguration
From ACM TechNews

Nissan Source Code Leaked Online After Git Repo Misconfiguration

Software engineer Tillie Kottmann said Nissan North America's misconfiguration of a Bitbucket Git server led to the online leakage of the automaker’s source code...

Malware Uses WiFi BSSID for Victim Identification
From ACM TechNews

Malware Uses WiFi BSSID for Victim Identification

A newly discovered malware strain collects an infected user's Basic Service Set Identifier, in order to ascertain the location of the user and their Wi-Fi access...

Farmers Get Their Own Security Advice as Cyberattacks Increase
From ACM TechNews

Farmers Get Their Own Security Advice as Cyberattacks Increase

The U.K.'s National Cyber Security Center has published guidance for farmers to help guard against cyberattacks.

Ransomware vs WFH: How Remote Working is Making Cyberattacks Easier to Pull Off
From ACM News

Ransomware vs WFH: How Remote Working is Making Cyberattacks Easier to Pull Off

This year has forced organizations to adapt quickly to enabling employees to work from home. That's creating 'chaos with no control' - which cyber criminals are...

Singapore Tightens Security Requirements for Home Routers
From ACM TechNews

Singapore Tightens Security Requirements for Home Routers

Beginning next April, home Wi-Fi routers sold in Singapore must meet new security requirements.

4G, 5G Networks Could Be Vulnerable to Exploit Due to 'Mishmash' of Old Technologies
From ACM TechNews

4G, 5G Networks Could Be Vulnerable to Exploit Due to 'Mishmash' of Old Technologies

Positive Technologies' Sergey Puzankov said that outstanding issues in the Signaling System 7  protocol continue to plague the telecommunications industry as it...

Australia's Report on Agtech Confirms Technology Can Lead to Fertile Future
From ACM TechNews

Australia's Report on Agtech Confirms Technology Can Lead to Fertile Future

A new report says emerging technologies could enhance the productivity, diversity, and profitability of Australia's agricultural sector.

This Is How Much Top Hackers Are Earning From Bug Bounties
From ACM TechNews

This Is How Much Top Hackers Are Earning From Bug Bounties

More than $44.75 million in bounties was awarded to hackers worldwide over the past year, up 86% year-on-year, according to HackerOne.

CISA: Chinese State Hackers Are Exploiting F5, Citrix, Pulse Secure, Exchange Bugs
From ACM TechNews

CISA: Chinese State Hackers Are Exploiting F5, Citrix, Pulse Secure, Exchange Bugs

An advisory from the Cybersecurity and Infrastructure Security Agency (CISA) warns of attacks against U.S. federal networks by hacker groups associated with China's...

Most Cybersecurity Reports Only Focus on the Cool Threats
From ACM TechNews

Most Cybersecurity Reports Only Focus on the Cool Threats

A study found just 82 of 629 commercial cybersecurity reports published in the last decade discuss threats to civil society, with the rest devoted to cybercrime...

Millions of WordPress Sites Are Being Probed, Attacked With Recent Plugin Bug
From ACM TechNews

Millions of WordPress Sites Are Being Probed, Attacked With Recent Plugin Bug

Defiant Inc. reports millions of WordPress sites have been attacked by hackers exploiting a zero-day vulnerability in the "File Manager" WordPress plugin.

Malware Gang Uses .NET Library to Generate Excel Docs That Bypass Security Checks
From ACM TechNews

Malware Gang Uses .NET Library to Generate Excel Docs That Bypass Security Checks

Security researchers at NVISO Labs discovered a malware gang is using a .NET library to create malicious Excel files.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account