acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
dateMore Than a Year Ago
subjectManagement
authorDavid Geer
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Cybercrime Enablers
From ACM News

Cybercrime Enablers

Initial Access Brokers sell unauthorized access.

The SEC's Cybersecurity Rules
From ACM News

The SEC's Cybersecurity Rules

Public companies now must report material cybersecurity incidents within four business days.

Should Schools Rely on Government for Cyber Protection?
From ACM News

Should Schools Rely on Government for Cyber Protection?

Can the federal government protect K-12 schools and their students from cyberattacks?

Using Psychology to Bolster Cybersecurity
From Communications of the ACM

Using Psychology to Bolster Cybersecurity

Getting into the minds of attackers to protect the enterprise.

Giving Users More than They Can Handle
From ACM News

Giving Users More than They Can Handle

Are Microsoft's artificial intelligence files creating security issues for customers?

Concerns Grow about MFA Bypass Attacks
From ACM News

Concerns Grow about MFA Bypass Attacks

Cybercriminals increasingly are using specially crafted attacks to bypass Multi-Factor authentication.

Turning AI to Crime
From ACM News

Turning AI to Crime

How cybercriminals use ChatGPT in creating malware and cyberattacks.  

Fending off Cyberattacks on Collaborative Robots
From ACM News

Fending off Cyberattacks on Collaborative Robots

Hackers leverage IoT, IIoT vulnerabilities to gain unauthorized access to cobots.

NIST Post-Quantum Cryptography Candidate Cracked
From ACM News

NIST Post-Quantum Cryptography Candidate Cracked

It took researchers in Belgium just an hour to crack the SIKE cryptographic algorithm.

Samsung Breach Slams Consumers
From ACM News

Samsung Breach Slams Consumers

Including this writer.

Software Insecurity
From ACM News

Software Insecurity

Software is more vulnerable than we think.

Raising the Ramparts
From ACM News

Raising the Ramparts

Why the enterprise needs military-grade cybersecurity, too.

Cybercriminals Eye Biometrics
From ACM News

Cybercriminals Eye Biometrics

Biometric markers are increasingly popular targets of data theft, potentially endangering far more than your locally stored information.

Anticipating the War's Direction
From ACM News

Anticipating the War's Direction

Is the U.S. at risk of Russian cyberattacks related to Ukraine?

BlackByte Ransomware Bites Critical Infrastructure, the San Francisco 49ers
From ACM News

BlackByte Ransomware Bites Critical Infrastructure, the San Francisco 49ers

One ransomware attack struck a professional football team as competitors were preparing for the Super Bowl.

A Source of Security Challenges for Years to Come
From ACM News

A Source of Security Challenges for Years to Come

Cybersecurity experts agree the recently uncovered Log4Shell software vulnerability is the most dangerous on record.

Active Defenders
From ACM News

Active Defenders

How the new self-healing cybersecurity software works.

Cyber Risk in Digital Transformation
From ACM News

Cyber Risk in Digital Transformation

Cybersecurity missteps during corporate Digital Transformation efforts can lead to digital breaches.

Are We Engaged in a Cyber-war?
From ACM News

Are We Engaged in a Cyber-war?

Here are the reasons why we're not.

Cyber-Securing the Home Office
From ACM News

Cyber-Securing the Home Office

Patching the security holes that arise when working from home.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account