Sign In

Communications of the ACM

News


An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Cybersecurity Giants to Combat Cyberthreats Under OASIS Umbrella
From ACM TechNews

Cybersecurity Giants to Combat Cyberthreats Under OASIS Umbrella

IBM, McAfee, and 16 more firms have launched an effort to address fragmentation and interoperability problems in cybersecurity.

Microsoft Says Iran Tried Hack of U.S. Presidential Campaign
From ACM TechNews

Microsoft Says Iran Tried Hack of U.S. Presidential Campaign

Microsoft says a hacker group connected to the Iranian government has tried to compromise email accounts of a U.S. presidential campaign, current and former U.S...

Encryption System Protects Data from Quantum Computers
From ACM TechNews

Encryption System Protects Data from Quantum Computers

IBM researchers have demonstrated a quantum-proof encryption method called CRYSTALS that can successfully encrypt a magnetic-tap storage device.  

Academics Find Vulnerabilities in Android's VoIP Components
From ACM TechNews

Academics Find Vulnerabilities in Android's VoIP Components

Scientists at China's OPPO ZIWU Cyber Security Lab, the Chinese University of Hong Kong, and Singapore Management University identified eight flaws in Android's...

Decade of Cybersecurity Data Could Predict Future Malicious Online Activity
From ACM TechNews

Decade of Cybersecurity Data Could Predict Future Malicious Online Activity

Researchers have developed a comprehensive dataset of the global cybersecurity threat landscape from 2007 to 2017, to help cybersecurity specialists derive new...

People Are Overconfident About Identifying Phishing Emails
From ACM TechNews

People Are Overconfident About Identifying Phishing Emails

The results of a new study suggest that people may be overconfident in their ability to identify email phishing scams.

Ransomware Forces Hospitals to Turn Away All but Most Critical Patients
From ACM TechNews

Ransomware Forces Hospitals to Turn Away All but Most Critical Patients

Ransomware has crippled hospitals in Alabama and Australia, blocking admission for all but the most critical new patients.

U.S. Steps Up Scrutiny of Airplane Cybersecurity
From ACM TechNews

U.S. Steps Up Scrutiny of Airplane Cybersecurity

The U.S. Department of Homeland Security has revived a program to identify cybersecurity vulnerabilities in aviation, in conjunction with the Pentagon and the U...

Microsoft, MasterCard, Hewlett Foundation Launch Institute to Investigate Cyberattacks
From ACM TechNews

Microsoft, MasterCard, Hewlett Foundation Launch Institute to Investigate Cyberattacks

Microsoft, MasterCard, the Hewlett Foundation, and other organizations have jointly announced the launch of an institute to probe cyberattacks and help their victims...

Lawmakers Warn About Threat of Political Deepfakes by Creating One
From ACM TechNews

Lawmakers Warn About Threat of Political Deepfakes by Creating One

Two U.S. congressmen created an artificial intelligence-doctored political video to demonstrate the threat such disinformation presents.

Decades-Old Code Putting Millions of Critical Devices at Risk
From ACM TechNews

Decades-Old Code Putting Millions of Critical Devices at Risk

Recently discovered vulnerabilities in a nearly 20-year-old industry standard network protocol from Interpeak could potentially make millions of devices exploitable...

PDFex Attack Can Exfiltrate Data from Encrypted PDF Files
From ACM TechNews

PDFex Attack Can Exfiltrate Data from Encrypted PDF Files

Researchers in Germany have developed a new attack that can extract and steal data from encrypted Portable Document Format (PDF)  files, sometimes without user...

High-Tech Sensors May Be Key to Autonomous Cars
From ACM TechNews

High-Tech Sensors May Be Key to Autonomous Cars

Some companies are considering the use of high-tech sensors to address self-driving cars'  limited ability to safely maneuver in traffic and see clearly in all...

Google Draws House Antitrust Scrutiny of Internet Protocol
From ACM TechNews

Google Draws House Antitrust Scrutiny of Internet Protocol

Congressional antitrust investigators are vetting Google's plans to use a new Internet protocol out of worry it could limit competitors' access to consumer data...

Twenty-Seven Countries Sign Cybersecurity Pledge with Digs at China, Russia
From ACM TechNews

Twenty-Seven Countries Sign Cybersecurity Pledge with Digs at China, Russia

Twenty-seven countries signed a joint cybersecurity pledge in a lead-up to the U.N. General Assembly's General Debate last week.

At Least 70 Countries Have Had Disinformation Campaigns, Study Finds
From ACM TechNews

At Least 70 Countries Have Had Disinformation Campaigns, Study Finds

Researchers have found that governments worldwide are stepping up their online disinformation campaigns despite more aggressive regulatory efforts by Internet platforms...

Huawei Suspended From Global Forum Aimed at Combating Cybersecurity Breaches
From ACM TechNews

Huawei Suspended From Global Forum Aimed at Combating Cybersecurity Breaches

Huawei Technologies' membership in the Forum of Incident Response and Security Teams has been suspended.

Hackers Say They Took Over Vote Scanners Like Those Coming to Georgia
From ACM TechNews

Hackers Say They Took Over Vote Scanners Like Those Coming to Georgia

A report from the DEF CON Voting Machine Hacking Village conference described the discovery of a hack for commandeering ballot-scanning machines similar to those...

Decoding How Kids Get Into Hacking
From ACM TechNews

Decoding How Kids Get Into Hacking

Michigan State University's Thomas Holt identified characteristics and gender-specific behavioral patterns that could inspire children to become hackers.

Map Shows All the Code Connections Between Russia's Hacker Groups
From ACM TechNews

Map Shows All the Code Connections Between Russia's Hacker Groups

Israeli cybersecurity firms Check Point and Intezer have charted Russian hackers' toolkits from wide-ranging analysis of 2,500 malware samples.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account