acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Defending the Business
From ACM News

Defending the Business

The potential for a cyber incident is a top risk to business globally.

Multiple Data Leaks at 23andMe
From ACM News

Multiple Data Leaks at 23andMe

Stolen genetic data leads to class action suit against the testing firm.

Cybercrime Enablers
From ACM News

Cybercrime Enablers

Initial Access Brokers sell unauthorized access.

The SEC's Cybersecurity Rules
From ACM News

The SEC's Cybersecurity Rules

Public companies now must report material cybersecurity incidents within four business days.

Should Schools Rely on Government for Cyber Protection?
From ACM News

Should Schools Rely on Government for Cyber Protection?

Can the federal government protect K-12 schools and their students from cyberattacks?

Using Psychology to Bolster Cybersecurity
From Communications of the ACM

Using Psychology to Bolster Cybersecurity

Getting into the minds of attackers to protect the enterprise.

Giving Users More than They Can Handle
From ACM News

Giving Users More than They Can Handle

Are Microsoft's artificial intelligence files creating security issues for customers?

Concerns Grow about MFA Bypass Attacks
From ACM News

Concerns Grow about MFA Bypass Attacks

Cybercriminals increasingly are using specially crafted attacks to bypass Multi-Factor authentication.

Turning AI to Crime
From ACM News

Turning AI to Crime

How cybercriminals use ChatGPT in creating malware and cyberattacks.  

Fending off Cyberattacks on Collaborative Robots
From ACM News

Fending off Cyberattacks on Collaborative Robots

Hackers leverage IoT, IIoT vulnerabilities to gain unauthorized access to cobots.

NIST Post-Quantum Cryptography Candidate Cracked
From ACM News

NIST Post-Quantum Cryptography Candidate Cracked

It took researchers in Belgium just an hour to crack the SIKE cryptographic algorithm.

Samsung Breach Slams Consumers
From ACM News

Samsung Breach Slams Consumers

Including this writer.

Software Insecurity
From ACM News

Software Insecurity

Software is more vulnerable than we think.

Raising the Ramparts
From ACM News

Raising the Ramparts

Why the enterprise needs military-grade cybersecurity, too.

Defending the Enterprise
From ACM News

Defending the Enterprise

Using chaos testing to stabilize cybersecurity.

Cybercriminals Eye Biometrics
From ACM News

Cybercriminals Eye Biometrics

Biometric markers are increasingly popular targets of data theft, potentially endangering far more than your locally stored information.

Anticipating the War's Direction
From ACM News

Anticipating the War's Direction

Is the U.S. at risk of Russian cyberattacks related to Ukraine?

BlackByte Ransomware Bites Critical Infrastructure, the San Francisco 49ers
From ACM News

BlackByte Ransomware Bites Critical Infrastructure, the San Francisco 49ers

One ransomware attack struck a professional football team as competitors were preparing for the Super Bowl.

A Source of Security Challenges for Years to Come
From ACM News

A Source of Security Challenges for Years to Come

Cybersecurity experts agree the recently uncovered Log4Shell software vulnerability is the most dangerous on record.

Active Defenders
From ACM News

Active Defenders

How the new self-healing cybersecurity software works.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account