acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


 Anonymous Claims it Hacked Russia's Central Bank
From ACM News

Anonymous Claims it Hacked Russia's Central Bank

Group has already leaked thousands of Kremlin documents relating to the war.

The FTC's New Enforcement Weapon Spells Death for Algorithms
From ACM News

The FTC's New Enforcement Weapon Spells Death for Algorithms

It may have found a new standard for penalizing tech companies that violate privacy and use deceptive data practices: algorithmic destruction.

How Native Americans Try to Debug AI's Biases
From ACM TechNews

How Native Americans Try to Debug AI's Biases

At the recent American Indian Science and Engineering Society, students in a workshop created metadata to train an algorithm to understand an image's cultural significance...

CISA Warning: Russian Actors Bypassed 2FA
From ACM News

CISA Warning: Russian Actors Bypassed 2FA

What happened, how to avoid it.

A Big Bet to Kill the Password for Good
From ACM News

A Big Bet to Kill the Password for Good

FIDO is looking to get to the heart of what still makes passwordless schemes tough to navigate.

The Workaday Life of the World's Most Dangerous Ransomware Gang
From ACM News

The Workaday Life of the World's Most Dangerous Ransomware Gang

A Ukrainian researcher leaked 60,000 messages from inside Conti. Here's what they reveal.

Can AI Learn to Forget?
From Communications of the ACM

Can AI Learn to Forget?

Specialized techniques may make it possible to induce selective 'amnesia' in machine learning models.

Technology's Impact on Morality
From Communications of the ACM

Technology's Impact on Morality

Leading technologists and thinkers are concerned about technology's impact on our ethical thinking.

Leaked Ransomware Docs Show Conti Helping Putin From the Shadows
From ACM News

Leaked Ransomware Docs Show Conti Helping Putin From the Shadows

Members of the hacker gang may act in Russia's interest, but their links to the FSB and Cozy Bear hackers appear ad hoc.

New Attack Amplifies DDoSes by 4 Billion-Fold
From ACM TechNews

New Attack Amplifies DDoSes by 4 Billion-Fold

New technique also stretches out distributed denial of service durations to 14 hours.

Twitter Unveils Version of Site That Can Bypass Russia Block
From ACM TechNews

Twitter Unveils Version of Site That Can Bypass Russia Block

Twitter has launched a version of its service that can circumvent Russia's attempts to block and censor the flow of information about its Ukraine invasion.

Encryption Meant to Protect Against Quantum Hackers Is Easily Cracked
From ACM TechNews

Encryption Meant to Protect Against Quantum Hackers Is Easily Cracked

Ward Beullens at IBM Research Zurich in Switzerland easily cracked a cryptography algorithm touted as one of three contenders for a global standard against quantum...

Medical, IoT Devices Vulnerable to Attack
From ACM TechNews

Medical, IoT Devices Vulnerable to Attack

Researchers discovered seven vulnerabilities, known collectively as "Access:7," in more than 150 Internet of Things devices made by more than 100 companies.

Can AI Help Casinos Cut Down on Problem Gambling?
From ACM TechNews

Can AI Help Casinos Cut Down on Problem Gambling?

Researchers are looking to artificial intelligence as a way to potentially identify and predict problem gambling.

War Is Calling Crypto's 'Neutrality' Into Question
From ACM News

War Is Calling Crypto's 'Neutrality' Into Question

War in Ukraine and Western sanctions against Russia have made cryptocurrency a hot potato for international politics.

HP Patches 16 UEFI Firmware Bugs Allowing Stealthy Malware Infections
From ACM TechNews

HP Patches 16 UEFI Firmware Bugs Allowing Stealthy Malware Infections

Researchers at Binarly discovered 16 high-impact UEFI firmware vulnerabilities affecting multiple HP models.

Reality Intrudes on a Utopian Crypto Vision
From ACM News

Reality Intrudes on a Utopian Crypto Vision

The cryptocurrency boom has spawned enterprises democratically governed by a community of users. Or that's the theory. Making it work has been much mess

How Picking Up Your Smartphone Could Reveal Your Identity
From ACM TechNews

How Picking Up Your Smartphone Could Reveal Your Identity

Researchers from Lancaster University and the University of Bath use phone usage time to help identify users

Hackers Find a New Way to Deliver Devastating DDoS Attacks
From ACM News

Hackers Find a New Way to Deliver Devastating DDoS Attacks

Cybercriminals are exploiting a fleet of more than 100,000 misconfigured servers to knock websites offline.

Volunteer Hackers Converge on Ukraine Conflict
From ACM News

Volunteer Hackers Converge on Ukraine Conflict

The online battles have blurred lines between state-backed hackers and patriotic amateurs, making it difficult for governments to understand who is attacking them...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account