Researchers developed the Near-Ultrasound Inaudible Trojan to show how hackers can exploit the vulnerabilities of smart device microphones and voice assistants...University of Texas at San Antonio From ACM TechNews | March 24, 2023
Researchers in Google's Mandiant division have found state-sponsored hackers in China have been evading common cybersecurity tools and spying on government and...The Wall Street Journal From ACM TechNews | March 22, 2023
Government employees in the United States and internationally often reuse passwords for their work and personal accounts, according to researchers at threat intelligence...GCN From ACM TechNews | March 20, 2023
Meme-makers and misinformation peddlers are embracing artificial intelligence tools to create convincing fake videos on the cheap.
The New York Times From ACM News | March 13, 2023
Researchers at Slovak cybersecurity firm ESET have found the first real-world case of Unified Extensible Firmware Interface malware that can take over a computer's...Ars Technica From ACM TechNews | March 9, 2023
Rather than obtaining a warrant, the bureau purchased sensitive data—a controversial practice that privacy advocates say is deeply problematic.
Wired From ACM News | March 9, 2023
Tech innovations are again racing ahead of Washington's ability to regulate them, lawmakers and A.I. experts said.
The New York Times From ACM News | March 6, 2023
Companies like Paradromics and Synchron are competing with Elon Musk's Neuralink to design a brain implant that can communicate with computers.
The Washington Post From ACM TechNews | March 6, 2023
Researchers in France found so-called "cat qubits” (quantum bits) could reduce errors by quantum computers and accelerate the cracking of common encryption algorithms...New Scientist From ACM TechNews | March 6, 2023
The policy document urges more mandates on the firms that control most of the nation's digital infrastructure, and an expanded government role to disrupt hackers...The New York Times From ACM News | March 3, 2023
The plan touts many of the cybersecurity regulations already handed down for oil and natural gas pipelines, aviation, rail, and water systems, but it notes that...The Record From ACM News | March 2, 2023
Hackers leverage IoT, IIoT vulnerabilities to gain unauthorized access to cobots.
David Geer Commissioned by CACM Staff From ACM News | February 28, 2023
Companies including OpenAI and TikTok have signed up to a new set of guidelines designed to help them be more transparent around generative AI.
MIT Technology Review From ACM News | February 27, 2023
Researchers at cybersecurity company Trellix say they discovered a new class of privilege escalation vulnerability in Apple devices, rooted in Israeli spyware maker...Computer Weekly From ACM TechNews | February 27, 2023
The Bank of Japan said that following two years of experimentation, Japan in April will initiate a program to test a digital currency.
Reuters From ACM TechNews | February 23, 2023