acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectLegal Aspects
authorDavid Geer
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Defending the Business
From ACM News

Defending the Business

The potential for a cyber incident is a top risk to business globally.

Multiple Data Leaks at 23andMe
From ACM News

Multiple Data Leaks at 23andMe

Stolen genetic data leads to class action suit against the testing firm.

Cybercrime Enablers
From ACM News

Cybercrime Enablers

Initial Access Brokers sell unauthorized access.

The SEC's Cybersecurity Rules
From ACM News

The SEC's Cybersecurity Rules

Public companies now must report material cybersecurity incidents within four business days.

Should Schools Rely on Government for Cyber Protection?
From ACM News

Should Schools Rely on Government for Cyber Protection?

Can the federal government protect K-12 schools and their students from cyberattacks?

Concerns Grow about MFA Bypass Attacks
From ACM News

Concerns Grow about MFA Bypass Attacks

Cybercriminals increasingly are using specially crafted attacks to bypass Multi-Factor authentication.

Turning AI to Crime
From ACM News

Turning AI to Crime

How cybercriminals use ChatGPT in creating malware and cyberattacks.  

Fending off Cyberattacks on Collaborative Robots
From ACM News

Fending off Cyberattacks on Collaborative Robots

Hackers leverage IoT, IIoT vulnerabilities to gain unauthorized access to cobots.

NIST Post-Quantum Cryptography Candidate Cracked
From ACM News

NIST Post-Quantum Cryptography Candidate Cracked

It took researchers in Belgium just an hour to crack the SIKE cryptographic algorithm.

Samsung Breach Slams Consumers
From ACM News

Samsung Breach Slams Consumers

Including this writer.

Raising the Ramparts
From ACM News

Raising the Ramparts

Why the enterprise needs military-grade cybersecurity, too.

Defending the Enterprise
From ACM News

Defending the Enterprise

Using chaos testing to stabilize cybersecurity.

Cybercriminals Eye Biometrics
From ACM News

Cybercriminals Eye Biometrics

Biometric markers are increasingly popular targets of data theft, potentially endangering far more than your locally stored information.

Anticipating the War's Direction
From ACM News

Anticipating the War's Direction

Is the U.S. at risk of Russian cyberattacks related to Ukraine?

BlackByte Ransomware Bites Critical Infrastructure, the San Francisco 49ers
From ACM News

BlackByte Ransomware Bites Critical Infrastructure, the San Francisco 49ers

One ransomware attack struck a professional football team as competitors were preparing for the Super Bowl.

Active Defenders
From ACM News

Active Defenders

How the new self-healing cybersecurity software works.

Cyber Risk in Digital Transformation
From ACM News

Cyber Risk in Digital Transformation

Cybersecurity missteps during corporate Digital Transformation efforts can lead to digital breaches.

Are We Engaged in a Cyber-war?
From ACM News

Are We Engaged in a Cyber-war?

Here are the reasons why we're not.

Keeping Control of the Wheel
From ACM News

Keeping Control of the Wheel

Developments in automotive cybersecurity.

Is 5G Opening Security Holes in the Internet of Things?
From ACM News

Is 5G Opening Security Holes in the Internet of Things?

The new 5G networks increase hacker access to the Internet of Things.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account