Sign In

Communications of the ACM

News


An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Side-Channel Attack Can Recover Encryption Keys From Google Titan Security Keys
From ACM TechNews

Side-Channel Attack Can Recover Encryption Keys From Google Titan Security Keys

Researchers at French security company NinjaLab found a vulnerability impacting chips used in Google Titan and YubiKey hardware security keys.

Microsoft, Oracle and Salesforce Join Push for Digital Vaccination Credentials
From ACM News

Microsoft, Oracle and Salesforce Join Push for Digital Vaccination Credentials

In the U.S., there is no federal system consumers can use to get easy access to their immunization records online and establish their vaccination status for work...

Hack the Army Bug Bounty Challenge Asks Hackers to Find Vulnerabilities in Military Networks
From ACM TechNews

Hack the Army Bug Bounty Challenge Asks Hackers to Find Vulnerabilities in Military Networks

The Defense Digital Service and HackerOne are calling on military and civilian hackers to identify cybersecurity vulnerabilities in the U.S. Army's computer systems...

Just Think: The Outlook for BCI
From ACM News

Just Think: The Outlook for BCI

Where Brain-Computer Interfaces are headed.

Slouch or Slack Off, This 'Smart' Office Chair Cushion Will Record It
From ACM TechNews

Slouch or Slack Off, This 'Smart' Office Chair Cushion Will Record It

"Smart cushions" designed by a Chinese technology company and used in office chairs have engendered controversy over privacy and surveillance.

As Coronavirus Cases Surge, So Do Cyberattacks Against the Healthcare Sector
From ACM TechNews

As Coronavirus Cases Surge, So Do Cyberattacks Against the Healthcare Sector

Cybersecurity firm Check Point found a 45% increase in cyberattacks against the global healthcare sector since November, versus a 22% uptick against all worldwide...

U.K. Government Use of 'General Warrants' to Authorize Computer, Phone Hacking Is Unlawful: Court
From ACM TechNews

U.K. Government Use of 'General Warrants' to Authorize Computer, Phone Hacking Is Unlawful: Court

The U.K.'s High Court has ruled that government security and intelligence services cannot use "general warrants" to indiscriminately hack domestic mobile phones...

Airport Screening While Wearing Masks? Facial Recognition Tech Shows Up to 96% Accuracy in Recent Test
From ACM TechNews

Airport Screening While Wearing Masks? Facial Recognition Tech Shows Up to 96% Accuracy in Recent Test

What was described as a controlled test of facial recognition technologies found potential for accurately identifying individuals on security lines at airports...

Trump Administration Rolls Out Plan to Secure Maritime Sector Against Cyber Threats
From ACM TechNews

Trump Administration Rolls Out Plan to Secure Maritime Sector Against Cyber Threats

The White House has unveiled a plan to protect the U.S. maritime transportation sector against cybersecurity threats.

Nissan Source Code Leaked Online After Git Repo Misconfiguration
From ACM TechNews

Nissan Source Code Leaked Online After Git Repo Misconfiguration

Software engineer Tillie Kottmann said Nissan North America's misconfiguration of a Bitbucket Git server led to the online leakage of the automaker’s source code...

Telegram Feature Exposes Your Precise Address to Hackers
From ACM TechNews

Telegram Feature Exposes Your Precise Address to Hackers

Hackers can exploit the Telegram messenger application employed in Android devices and iPhones to pinpoint users' precise locations.

Malware Uses WiFi BSSID for Victim Identification
From ACM TechNews

Malware Uses WiFi BSSID for Victim Identification

A newly discovered malware strain collects an infected user's Basic Service Set Identifier, in order to ascertain the location of the user and their Wi-Fi access...

Hackers Exploit Backdoor Built Into Zyxel Devices
From ACM TechNews

Hackers Exploit Backdoor Built Into Zyxel Devices

Niels Teusink, a researcher at Netherlands-based security firm Eye Control, found that hackers are attempting to exploit a backdoor built into several Zyxel device...

Digital IDs Make Their Mark
From ACM News

Digital IDs Make Their Mark

Encrypted identification data on a smartcard or smartphone can deliver significant benefits while boosting security, but raise concerns about privacy and the potential...

Microsoft Says Russian Hackers Viewed Some of Its Source Code
From ACM TechNews

Microsoft Says Russian Hackers Viewed Some of Its Source Code

Microsoft on Thursday said the Russian exploit of U.S. government agencies and private corporations extended further into its network than previously thought.

Insecure Wheels: Police Turn to Car Data to Destroy Suspects' Alibis
From ACM TechNews

Insecure Wheels: Police Turn to Car Data to Destroy Suspects' Alibis

Law enforcement agencies increasingly are using data stored in an automobile's onboard computers to solve crimes.

Apple Loses Copyright Battle Against Security Startup Corellium
From ACM TechNews

Apple Loses Copyright Battle Against Security Startup Corellium

Apple's lawsuit against security research firm Corellium has failed, with a federal judge rejecting claims that Corellium's software breached copyright law.

Apple, Google to Stop X-Mode From Collecting Location Data From Users' Phones
From ACM TechNews

Apple, Google to Stop X-Mode From Collecting Location Data From Users' Phones

Apple and Google said they will bar data broker X-Mode Social from culling location information from mobile devices running their operating systems.

How We Can Be Manipulated Into Sharing Private Information Online
From ACM TechNews

How We Can Be Manipulated Into Sharing Private Information Online

Researchers found online users are more likely to expose private information based on the structuring of website forms.

A Better Kind of Cybersecurity Strategy
From ACM TechNews

A Better Kind of Cybersecurity Strategy

Researchers contend Russia's use of North Korean IP addresses for a 2018 cyberattack underscored the need for a new cybersecurity strategy involving selective retaliation...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account