acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
dateMore Than a Year Ago
subjectLegal Aspects
authorArs Technica
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Three iOS 0-Days Used to Infect iPhone
From ACM TechNews

Three iOS 0-Days Used to Infect iPhone

Researchers said Apple has corrected a series iOS zero-day flaws used to infect Egyptian presidential candidate Ahmed Eltantawy's iPhone with Predator spyware. ...

Microsoft Comes Under Blistering Criticism for 'Grossly Irresponsible' Security
From ACM News

Microsoft Comes Under Blistering Criticism for 'Grossly Irresponsible' Security

Azure looks like a house of cards collapsing under the weight of exploits and vulnerabilities.

OpenAI Discontinues Its AI Writing Detector Due to 'Low Rate of Accuracy'
From ACM News

OpenAI Discontinues Its AI Writing Detector Due to 'Low Rate of Accuracy'

Research shows that any AI writing detector can be defeated—and false positives abound.

Google Tells Canada It Won't Pay 'Link Tax,' Will Pull News Links from Search
From ACM News

Google Tells Canada It Won't Pay 'Link Tax,' Will Pull News Links from Search

Canada requiring payments from tech to news orgs; similar bills pending in the U.S.

Used Routers Often Loaded with Corporate Secrets
From ACM TechNews

Used Routers Often Loaded with Corporate Secrets

Scientists from Slovak security firm ESET found that half of the used routers its researchers purchased for testing were loaded with sensitive corporate information...

Hackers Drain Bitcoin ATMs of $1.5 Million by Exploiting 0-Day Bug
From ACM TechNews

Hackers Drain Bitcoin ATMs of $1.5 Million by Exploiting 0-Day Bug

General Bytes reported that over $1.5 million in bitcoin was drained from Internet-accessible wallets via its bitcoin ATMs by hackers that exploited a previously...

Stealthy UEFI Malware Bypassing Secure Boot Enabled by Unpatchable Windows Flaw
From ACM TechNews

Stealthy UEFI Malware Bypassing Secure Boot Enabled by Unpatchable Windows Flaw

Researchers at Slovak cybersecurity firm ESET have found the first real-world case of Unified Extensible Firmware Interface malware that can take over a computer's...

China Bans AI-Generated Media Without Watermarks
From ACM TechNews

China Bans AI-Generated Media Without Watermarks

New regulations from China's Cyberspace Administration that go into effect Jan. 10, 2023, ban the creation of media using artificial intelligence without watermarks...

Pentagon Picked Four Tech Companies to Form $9B Cloud Computing Network
From ACM News

Pentagon Picked Four Tech Companies to Form $9B Cloud Computing Network

Microsoft agrees multi-cloud strategy is "the right one" for U.S. Defense Department.

A Scientist's Quest for an Accessible, Unhackable Voting Machine
From ACM News

A Scientist's Quest for an Accessible, Unhackable Voting Machine

After 19 years of work, Juan Gilbert says he has invented the most secure voting machine.

Europe Prepares to Rewrite Internet Rules
From ACM TechNews

Europe Prepares to Rewrite Internet Rules

The enactment of the European Union's Digital Markets Act is expected to force big technology platforms to become more transparent and interoperable next year. ...

Deepfake Audio Has a Tell
From ACM TechNews

Deepfake Audio Has a Tell

Researchers at the University of Florida can detect audio deepfakes by measuring acoustic and fluid dynamic distinctions between organic and synthetic voice samples...

Cops Wanted to Keep Mass Surveillance App Secret; Privacy Advocates Refused
From ACM News

Cops Wanted to Keep Mass Surveillance App Secret; Privacy Advocates Refused

Fog Reveal is "almost invisible" when attempting to search for it online.

Post-Quantum Encryption Contender Taken Out by Single-Core PC in One Hour
From ACM TechNews

Post-Quantum Encryption Contender Taken Out by Single-Core PC in One Hour

Researchers ruled out an algorithm selected by the U.S. National Institute of Standards and Technology as a potential post-quantum encryption program.

YouTube Content Creator Credentials Are Under Siege by YTStealer Malware
From ACM TechNews

YouTube Content Creator Credentials Are Under Siege by YTStealer Malware

A researcher at security firm Intezer identified a new malware that can steal YouTube content creators' authentication credentials.

FCC Lets Starlink Offer Internet Service in Moving Vehicles
From ACM News

FCC Lets Starlink Offer Internet Service in Moving Vehicles

"These services, never before available, promise the potential for expanding reach to remote and rural areas and facilitating higher quality broadband services...

Wide Range of Routers Under Attack by Sophisticated Malware
From ACM TechNews

Wide Range of Routers Under Attack by Sophisticated Malware

Researchers have discovered at least 80 routers in North America and Europe have been infected by a remote access Trojan as part of a larger hacking campaign.

Tesla Hack Gives Thieves Their Own Personal Key
From ACM TechNews

Tesla Hack Gives Thieves Their Own Personal Key

Austrian security researcher Martin Herfurt has demonstrated that electric vehicle company Tesla's updated near-field communication key card can be hacked.

'Tough to Forge' Digital Driver's License Actually Easy to Forge
From ACM TechNews

'Tough to Forge' Digital Driver's License Actually Easy to Forge

Security researchers have found that the supposedly hard-to-counterfeit digital driver's licenses in use in New South Wales, Australia, actually can be altered...

Some Top 100,000 Websites Collect Everything You Type--Before You Hit Submit
From ACM TechNews

Some Top 100,000 Websites Collect Everything You Type--Before You Hit Submit

Researchers analyzed the top 100,000 websites and found a significant number record some or all of visitors' typewritten data.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account