Recent charges, convictions, and sentences all indicate that the start-up world's habit of playing fast and loose with the truth actually has consequences.
The New York Times From ACM News | April 17, 2023
CISA and federal and international partners released a report providing software manufacturers with advice and specific guidance for creating products built and...Government Technology From ACM News | April 14, 2023
A project at Carnegie Mellon University to build a secure Internet of Things infrastructure has erupted into a dispute over monitoring and privacy.
MIT Technology Review From ACM TechNews | April 13, 2023
OpenAI announced a new bug bounty program that will offer people $200 to $20,000 for finding and reporting vulnerabilities in the ChatGPT chatbot.
Bloomberg From ACM TechNews | April 12, 2023
ACM has named Yael Tauman Kalai to receive the 2022 ACM Prize in Computing for fundamental contributions to cryptography that have influenced modern practices. ...ACM From ACM TechNews | April 12, 2023
The Biden administration has been trying to choke off use of hacking tools made by the Israeli firm NSO. It turns out that not every part of the government has...The New York Times From ACM News | April 3, 2023
Participants of the Pwn2Own software exploitation conference hacked technology from automaker Tesla twice at the Zero Day Initiative's Pwn2Own software exploitation...PC Magazine From ACM TechNews | March 29, 2023
The Biden administration says commercial spyware has proliferated in recent years with few controls and a high risk of abuse.
USA Today From ACM News | March 28, 2023
White House bans federal agencies from using spyware that poses national security and human rights risks in the U.S.
The Washington Post From ACM News | March 28, 2023
Utah's Governor Spencer J. Cox signed a social media bill that could restrict access to applications like TikTok and Instagram by children and adolescents.
The New York Times From ACM TechNews | March 28, 2023
General Bytes reported that over $1.5 million in bitcoin was drained from Internet-accessible wallets via its bitcoin ATMs by hackers that exploited a previously...Ars Technica From ACM TechNews | March 27, 2023
Researchers developed the Near-Ultrasound Inaudible Trojan to show how hackers can exploit the vulnerabilities of smart device microphones and voice assistants...University of Texas at San Antonio From ACM TechNews | March 24, 2023
Researchers in Google's Mandiant division have found state-sponsored hackers in China have been evading common cybersecurity tools and spying on government and...The Wall Street Journal From ACM TechNews | March 22, 2023
Government employees in the United States and internationally often reuse passwords for their work and personal accounts, according to researchers at threat intelligence...GCN From ACM TechNews | March 20, 2023