acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Thinking Like a Cyber-Attacker to Protect User Data
From ACM TechNews

Thinking Like a Cyber-Attacker to Protect User Data

Researchers exploit computer processor's on-chip interconnect to launch side-channel attacks.

Thousands of GitHub Repositories Hacked to Include Malware
From ACM TechNews

Thousands of GitHub Repositories Hacked to Include Malware

Software developer Stephen Lacy identified a malicious URL in the code of an open source project on GitHub that he found through a Google search.

Zoom Used In Smuggled Code Attack
From ACM TechNews

Zoom Used In Smuggled Code Attack

Google Project Zero security researcher Ivan Fratric launched a remote code execution attack by exploiting the technology underlying Zoom and other applications...

The Hacking of Starlink Terminals Has Begun
From ACM TechNews

The Hacking of Starlink Terminals Has Begun

Lennert Wouters at Belgium's Katholieke Universiteit Leuven hacked SpaceX's Starlink network.

FEC Greenlights Google Plan to Loosen Spam Filters, Overcoming Democratic Challenge
From ACM News

FEC Greenlights Google Plan to Loosen Spam Filters, Overcoming Democratic Challenge

Under the pilot program, campaigns would be able to circumvent algorithmic sorting by tech companies that at times sends their emails to spam.

IoT RapperBot Malware Targeting Linux Servers via SSH Brute-Forcing Attack
From ACM TechNews

IoT RapperBot Malware Targeting Linux Servers via SSH Brute-Forcing Attack

Researchers at FortiGuard Labs reported that an Internet of Things (IoT) botnet malware identified in mid-June has been evolving rapidly.

Raising the Ramparts
From ACM News

Raising the Ramparts

Why the enterprise needs military-grade cybersecurity, too.

U.S. Space Force Tests Robot Dogs to Patrol Cape Canaveral
From ACM TechNews

U.S. Space Force Tests Robot Dogs to Patrol Cape Canaveral

The U.S. Space Force held a demonstration of dog-like quadruped unmanned ground vehicles for patrols at Cape Canaveral.

Can Foundation Models Help Us Achieve 'Perfect Secrecy'?
From ACM TechNews

Can Foundation Models Help Us Achieve 'Perfect Secrecy'?

Stanford University researchers are exploring whether emerging foundation models can help to realize the highest level of privacy, or "perfect secrecy."

Gootkit Loader Resurfaces with Updated Tactic to Compromise Targeted Computers
From ACM TechNews

Gootkit Loader Resurfaces with Updated Tactic to Compromise Targeted Computers

Researchers have found the operators of the Gootkit access-as-a-service malware now are using legal documents to get unsuspecting users to download them.

India Withdraws a Proposed Law on Data Protection
From ACM News

India Withdraws a Proposed Law on Data Protection

A number of lawyers and experts say measures to safeguard citizens online are badly needed, but the bill was criticized by both privacy advocates and tech companies...

Extreme Security for Users Targeted by Cyberattack
From ACM News

Extreme Security for Users Targeted by Cyberattack

Apple's Lockdown Mode provides serious security to individuals personally targeted by sophisticated attackers.

Datacenters Are Facing Climate Crisis
From ACM TechNews

Datacenters Are Facing Climate Crisis

With studies predicting more extreme weather in the coming years, datacenters need to be prepared.

'Cryptojacking' Attacks on Financial Firms Surged in First Half
From ACM TechNews

'Cryptojacking' Attacks on Financial Firms Surged in First Half

The number of "cryptojacking" attacks on financial companies jumped 30% to 66.7 million during the first half of 2022 compared with the same period last year.

Post-Quantum Encryption Contender Taken Out by Single-Core PC in One Hour
From ACM TechNews

Post-Quantum Encryption Contender Taken Out by Single-Core PC in One Hour

Researchers ruled out an algorithm selected by the U.S. National Institute of Standards and Technology as a potential post-quantum encryption program.

More Accurate Wildfire Monitoring Using Social Media
From ACM TechNews

More Accurate Wildfire Monitoring Using Social Media

Wildfire prediction model uses social media and geophysical satellite data for more accurate real-time forecasting and monitoring.

Fiber-Optic Cables Could Be Used for Spying
From ACM TechNews

Fiber-Optic Cables Could Be Used for Spying

Device can eavesdrop on people up to 1 km away using existing fiber-optic cables.

Experts Uncover 'CosmicStrand' UEFI Firmware Rootkit Used by Chinese Hackers
From ACM TechNews

Experts Uncover 'CosmicStrand' UEFI Firmware Rootkit Used by Chinese Hackers

Rootkit hides in firmware images of Gigabyte or ASUS motherboards, all related to designs using the H81 chipset.

New Attack Can Unmask Anonymous Users on Any Major Browser
From ACM News

New Attack Can Unmask Anonymous Users on Any Major Browser

Researchers have found a way to use the web's basic functions to identify who visits a site—without the user detecting the hack.

Defending the Enterprise
From ACM News

Defending the Enterprise

Using chaos testing to stabilize cybersecurity.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account