acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorArs Technica
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Meltdown and Spectre: Here's What Intel, Apple, Microsoft, Others Are Doing About It
From ACM News

Meltdown and Spectre: Here's What Intel, Apple, Microsoft, Others Are Doing About It

The Meltdown and Spectre flaws—two related vulnerabilities that enable a wide range of information disclosure from every mainstream processor, with particularly...

'malware-Free' Attacks Mount in Big Breaches, Crowdstrike Finds
From ACM News

'malware-Free' Attacks Mount in Big Breaches, Crowdstrike Finds

Despite the rise of massive crypto-ransomware attacks, an even more troubling trend emerged in data gathered by the security firm CrowdStrike this past year and...

Inspired By Brain's Visual Cortex, New AI ­tterly Wrecks Captcha Security
From ACM News

Inspired By Brain's Visual Cortex, New AI ­tterly Wrecks Captcha Security

Computer algorithms have gotten much better at recognizing patterns, like specific animals or people's faces, allowing software to automatically categorize large...

Serious Flaw in Wpa2 Protocol Lets Attackers Intercept Passwords and Much More
From ACM TechNews

Serious Flaw in Wpa2 Protocol Lets Attackers Intercept Passwords and Much More

Researchers have discovered a severe flaw in the WPA2 protocol that enables hackers within range of a vulnerable device or access point to intercept passwords and...

Infrared Signals in Surveillance Cameras Let Malware Jump Network Air Gaps
From ACM News

Infrared Signals in Surveillance Cameras Let Malware Jump Network Air Gaps

Researchers have devised malware that can jump airgaps by using the infrared capabilities of an infected network's surveillance cameras to transmit data to and...

Secret Chips in Replacement Parts Can Completely Hijack Your Phone's Security
From ACM TechNews

Secret Chips in Replacement Parts Can Completely Hijack Your Phone's Security

Researchers at Ben-Gurion University of the Negev in Israel warn smartphone security can be compromised by repair shops that install replacement parts containing...

With the Uss mccain Collision, Even Navy Tech Can't Overcome Human Shortcomings
From ACM News

With the Uss mccain Collision, Even Navy Tech Can't Overcome Human Shortcomings

In the darkness of early morning on August 21, the guided-missile destroyer USS John S. McCain collided with a tanker in the Strait of Malacca off Singapore.

Radio Navigation Set to Make Global Return as Gps Backup, Because Cyber 
From ACM News

Radio Navigation Set to Make Global Return as Gps Backup, Because Cyber 

Way back in the 1980s, when I was a young naval officer, the Global Positioning System was still in its experimental stage.

New Web Tool Tracks Russian 'influence Ops' on Twitter
From ACM News

New Web Tool Tracks Russian 'influence Ops' on Twitter

The Alliance for Securing Democracy, a bipartisan project backed by the German Marshall Fund of the United States (GMF), has launched a Web tool to keep tabs on...

Concerned About Connected Car Privacy? Bluetooth Sensors Used to Track Traffic
From ACM News

Concerned About Connected Car Privacy? Bluetooth Sensors Used to Track Traffic

One big promise of the connected car revolution has been the potential to help clear up traffic problems.

'internet of Ships' Tells Tale of ­ss Fitzgerald Tragedy, Or Half of It
From ACM News

'internet of Ships' Tells Tale of ­ss Fitzgerald Tragedy, Or Half of It

On early Saturday morning off the coast of Japan, the Philippines-flagged cargo container carrierACX Crystal struck the USS Fitzgerald (DDG-62) on its starboard...

­S Gov’t Taps The Machine to Beat China to Exascale Supercomputing
From ACM News

­S Gov’t Taps The Machine to Beat China to Exascale Supercomputing

With China threatening to build the world's first exascale supercomputer before the US, the US Department of Energy has awarded a research grant to Hewlett Packard...

How a Few Yellow Dots Burned the Intercept's Nsa Leaker
From ACM News

How a Few Yellow Dots Burned the Intercept's Nsa Leaker

When reporters at The Intercept approached the National Security Agency on June 1 to confirm a document that had been anonymously leaked to the publication in May...

Leaked Nsa Report Says Russians Tried to Hack State Election Officials
From ACM News

Leaked Nsa Report Says Russians Tried to Hack State Election Officials

A Top Secret NSA analyst's report published by The Intercept suggests that, in August 2016, the Russian General Main Staff Intelligence Directorate (GRU) hacked...

Got a Face-Recognition Algorithm? ­ncle Sam Wants to Review It
From ACM News

Got a Face-Recognition Algorithm? ­ncle Sam Wants to Review It

The nation's top-level intelligence office, the Director of National Intelligence, wants to find "the most accurate unconstrained face recognition algorithm."

For Sale: Your Private Browsing History
From ACM News

For Sale: Your Private Browsing History

The US House of Representatives voted Tuesday to eliminate ISP privacy rules, following the Senate vote to take the same action last week. The legislation to kill...

To Keep Tor Hack Source Code Secret, Doj Dismisses Child Porn Case
From ACM News

To Keep Tor Hack Source Code Secret, Doj Dismisses Child Porn Case

Rather than share the now-classified technological means that investigators used to locate a child porn suspect, federal prosecutors in Washington state have ...

In Not-Too-Distant Future, Brain Hackers Could Steal Your Deepest Secrets
From ACM News

In Not-Too-Distant Future, Brain Hackers Could Steal Your Deepest Secrets

In the beginning, people hacked phones.

Who's Winning the Cyber War? The Squirrels, of Course
From ACM News

Who's Winning the Cyber War? The Squirrels, of Course


Hackers Trigger Yet Another Power Outage in Ukraine
From ACM News

Hackers Trigger Yet Another Power Outage in Ukraine

Sign In for Full Access
» Forgot Password? » Create an ACM Web Account