Sign In

Communications of the ACM

News


An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Machine Learning, Meet Whiskey
From Communications of the ACM

Machine Learning, Meet Whiskey

Technologies are coming increasingly closer to approximating the human senses of taste and smell.

How Universities Deploy Student Data
From Communications of the ACM

How Universities Deploy Student Data

Personalizing efforts to drive greater student retention and success.

Hospital Devices Exposed to Hacking with Unsupported Operating Systems
From ACM TechNews

Hospital Devices Exposed to Hacking with Unsupported Operating Systems

Cybersecurity firm Palo Alto Networks found that 83% of Internet-linked imaging devices in hospitals use outdated software containing known bugs that hackers can...

Bugs in Open Source Software Hit a Record High
From ACM TechNews

Bugs in Open Source Software Hit a Record High

The number of open source software vulnerabilities identified rose from 4,100 last year to 6,100 this year, according to security firm WhiteSource.

Record Set for Cryptographic Challenge
From ACM TechNews

Record Set for Cryptographic Challenge

A team of computer scientists in France and the U.S. has set a record for integer factorization, a major challenge in the security of most public key cryptography...

Panel Outlines Massive Federal Cybersecurity Overhaul
From ACM TechNews

Panel Outlines Massive Federal Cybersecurity Overhaul

The Congressional Cyberspace Solarium Commission report on the state of cybersecurity in the U.S. included sweeping recommendations for shoring up cyberdefense....

Facebook, Twitter Suspend Russian-Linked Operation Targeting African Americans on Social Media
From ACM TechNews

Facebook, Twitter Suspend Russian-Linked Operation Targeting African Americans on Social Media

Facebook and Twitter suspended a Russian-linked campaign designed to inflame racial tensions among African Americans in the U.S.

How Secure Are Four, Six-Digit Mobile Phone PINs?
From ACM TechNews

How Secure Are Four, Six-Digit Mobile Phone PINs?

Information technology security experts assessing personal identification numbers codes for securing smartphones found six-digit PINs offer little more security...

Modern RAM Still Vulnerable to Rowhammer Attacks
From ACM TechNews

Modern RAM Still Vulnerable to Rowhammer Attacks

Extensive mitigations deployed during the last six years have failed to eliminate modern random-access memory (RAM) cards' vulnerability to Rowhammer exploits. ...

China Tech Groups Censored Information About Coronavirus
From ACM TechNews

China Tech Groups Censored Information About Coronavirus

Researchers said Chinese social media platforms censored keywords related to the coronavirus outbreak as early as December, potentially limiting the Chinese public's...

The Cybersecurity 202: Cyber Solarium Commission Aims to Avert a Cyber 9/11 Before it’s Too Late
From ACM News

The Cybersecurity 202: Cyber Solarium Commission Aims to Avert a Cyber 9/11 Before it’s Too Late

The group's goal is to make recommendations like those from the 9/11 Commission Report, but before a major disaster in which an adversary could undermine parts...

Intel SGX is Vulnerable to an Unfixable Flaw That Can Steal Crypto Keys and More
From ACM TechNews

Intel SGX is Vulnerable to an Unfixable Flaw That Can Steal Crypto Keys and More

A team of international researchers disclosed a previously undiscovered vulnerability that steals information from Intel's Software Guard eXtensions.

How Wikipedia’s Volunteers Became the Web’s Best Weapon against Misinformation
From ACM News

How Wikipedia’s Volunteers Became the Web’s Best Weapon against Misinformation

In the Facebook era, the volunteer editors behind the archaic-looking website have built Wikipedia into a formidable force for truth.

Driverless Cars Face Laser Sabotage
From ACM News

Driverless Cars Face Laser Sabotage

Attacks on the light-based radar (LiDAR) of autonomous vehicles could drive them off the road, or freeze them in their (tire) tracks.

Hackers Can Clone Millions of Toyota, Hyundai, Kia Keys
From ACM TechNews

Hackers Can Clone Millions of Toyota, Hyundai, Kia Keys

Researchers found previously unknown vulnerabilities in encryption systems used by in-vehicle devices that communicate at close range with key fobs to unlock the...

Researchers Identify Cybersecurity Approach to Protect Army Systems
From ACM TechNews

Researchers Identify Cybersecurity Approach to Protect Army Systems

Researchers have developed an approach to protect Army systems from attack in ways that don't require massive amounts of manual intervention.

How the Cloud Has Opened Doors for Hackers
From ACM TechNews

How the Cloud Has Opened Doors for Hackers

Corporate transfers of operations to the cloud have elevated the threat of hacking.

Hacking Victims Are Uncovering Cyberattacks Faster; GDPR Is the Reason Why
From ACM TechNews

Hacking Victims Are Uncovering Cyberattacks Faster; GDPR Is the Reason Why

GDPR has been linked to quicker cyberattack discovery times in the European Union. 

This App Lets You See IoT Devices Around You and What Data They're Taking
From ACM TechNews

This App Lets You See IoT Devices Around You and What Data They're Taking

Researchers have developed an app that will let users know what IoT technologies are operating in the immediate vicinity and what data they are collecting. 

Flaw in Billions of Wi-Fi Devices Left Communications Open to Eavesdropping
From ACM TechNews

Flaw in Billions of Wi-Fi Devices Left Communications Open to Eavesdropping

Researchers at Slovakian Internet security company ESET discovered that billions of devices are affected by a Wi-Fi vulnerability that allows nearby attackers to...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account