acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorArs Technica
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Three iOS 0-Days Used to Infect iPhone
From ACM TechNews

Three iOS 0-Days Used to Infect iPhone

Researchers said Apple has corrected a series iOS zero-day flaws used to infect Egyptian presidential candidate Ahmed Eltantawy's iPhone with Predator spyware. ...

Google Algorithm Makes FIDO Encryption Safe from Quantum Computers
From ACM TechNews

Google Algorithm Makes FIDO Encryption Safe from Quantum Computers

A post-quantum cryptography (PQC) algorithm developed by researchers at Google and Switzerland's ETH Zurich enables quantum-resistant encryption for FIDO2 security...

Microsoft Comes Under Blistering Criticism for 'Grossly Irresponsible' Security
From ACM News

Microsoft Comes Under Blistering Criticism for 'Grossly Irresponsible' Security

Azure looks like a house of cards collapsing under the weight of exploits and vulnerabilities.

Used Routers Often Loaded with Corporate Secrets
From ACM TechNews

Used Routers Often Loaded with Corporate Secrets

Scientists from Slovak security firm ESET found that half of the used routers its researchers purchased for testing were loaded with sensitive corporate information...

Hackers Drain Bitcoin ATMs of $1.5 Million by Exploiting 0-Day Bug
From ACM TechNews

Hackers Drain Bitcoin ATMs of $1.5 Million by Exploiting 0-Day Bug

General Bytes reported that over $1.5 million in bitcoin was drained from Internet-accessible wallets via its bitcoin ATMs by hackers that exploited a previously...

Stealthy UEFI Malware Bypassing Secure Boot Enabled by Unpatchable Windows Flaw
From ACM TechNews

Stealthy UEFI Malware Bypassing Secure Boot Enabled by Unpatchable Windows Flaw

Researchers at Slovak cybersecurity firm ESET have found the first real-world case of Unified Extensible Firmware Interface malware that can take over a computer's...

AI-Powered Bing Chat Loses its Mind When Fed Ars Technica Article
From ACM News

AI-Powered Bing Chat Loses its Mind When Fed Ars Technica Article

"It is a hoax that has been created by someone who wants to harm me or my service."

RSA's Demise from Quantum Attacks is Very Much Exaggerated, Expert Says
From ACM News

RSA's Demise from Quantum Attacks is Very Much Exaggerated, Expert Says

Simson Garfinkel says the focus on quantum attacks may distract us from more immediate threats.

A Scientist's Quest for an Accessible, Unhackable Voting Machine
From ACM News

A Scientist's Quest for an Accessible, Unhackable Voting Machine

After 19 years of work, Juan Gilbert says he has invented the most secure voting machine.

Europe Prepares to Rewrite Internet Rules
From ACM TechNews

Europe Prepares to Rewrite Internet Rules

The enactment of the European Union's Digital Markets Act is expected to force big technology platforms to become more transparent and interoperable next year. ...

Deepfake Audio Has a Tell
From ACM TechNews

Deepfake Audio Has a Tell

Researchers at the University of Florida can detect audio deepfakes by measuring acoustic and fluid dynamic distinctions between organic and synthetic voice samples...

Cops Wanted to Keep Mass Surveillance App Secret; Privacy Advocates Refused
From ACM News

Cops Wanted to Keep Mass Surveillance App Secret; Privacy Advocates Refused

Fog Reveal is "almost invisible" when attempting to search for it online.

Organizations Spending Billions on Easy-to-Bypass Malware Defense
From ACM TechNews

Organizations Spending Billions on Easy-to-Bypass Malware Defense

Research suggests that hackers can easily circumvent Endpoint Detection and Response systems, the malware detecting and blocking solutions on which organizations...

Post-Quantum Encryption Contender Taken Out by Single-Core PC in One Hour
From ACM TechNews

Post-Quantum Encryption Contender Taken Out by Single-Core PC in One Hour

Researchers ruled out an algorithm selected by the U.S. National Institute of Standards and Technology as a potential post-quantum encryption program.

YouTube Content Creator Credentials Are Under Siege by YTStealer Malware
From ACM TechNews

YouTube Content Creator Credentials Are Under Siege by YTStealer Malware

A researcher at security firm Intezer identified a new malware that can steal YouTube content creators' authentication credentials.

Tesla Hack Gives Thieves Their Own Personal Key
From ACM TechNews

Tesla Hack Gives Thieves Their Own Personal Key

Austrian security researcher Martin Herfurt has demonstrated that electric vehicle company Tesla's updated near-field communication key card can be hacked.

Bluetooth Hack Can Unlock Tesla, Devices
From ACM TechNews

Bluetooth Hack Can Unlock Tesla, Devices

Sultan Qasim Khan at U.K.-based security firm NCC Group  devised an exploit for unlocking Teslas and countless other devices.

Some Top 100,000 Websites Collect Everything You Type--Before You Hit Submit
From ACM TechNews

Some Top 100,000 Websites Collect Everything You Type--Before You Hit Submit

Researchers analyzed the top 100,000 websites and found a significant number record some or all of visitors' typewritten data.

Apple, Google, Microsoft Want to Kill the Password with 'Passkey' Standard
From ACM TechNews

Apple, Google, Microsoft Want to Kill the Password with 'Passkey' Standard

Apple, Google, and Microsoft are launching a "joint effort" to "expand support for a common password-less sign-in standard created by the FIDO Alliance and the...

Gear from Netgear, Linksys, 200 Others Has Unpatched DNS Poisoning Flaw
From ACM TechNews

Gear from Netgear, Linksys, 200 Others Has Unpatched DNS Poisoning Flaw

Researchers at security firm Nozomi Networks identified an unpatched vulnerability in third-party code libraries used by 200 hardware and software vendors.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account