acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorIEEE Spectrum
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


It's Surprisingly Easy to Hack the Precision Time Protocol
From ACM TechNews

It's Surprisingly Easy to Hack the Precision Time Protocol

Researchers at Marist College and IBM have identified a simple but effective way to hack a PTP network, altering the timing of slave clocks by 2,149.5 minutes after...

Three Small Stickers in Intersection Can Cause Tesla Autopilot to Swerve Into Wrong Lane
From ACM News

Three Small Stickers in Intersection Can Cause Tesla Autopilot to Swerve Into Wrong Lane

Security researchers from Tencent have demonstrated a way to use physical attacks to spoof Tesla's autopilot.

Security Technology Detects Cyberattacks on Drones, Cars, Robots
From ACM TechNews

Security Technology Detects Cyberattacks on Drones, Cars, Robots

Researchers at Mitsubishi Electric have developed sensor-security technology for detecting inconsistencies in sensor measurements when a system is under attack....

Circuit Secures the IoT Against Quantum Attack
From ACM TechNews

Circuit Secures the IoT Against Quantum Attack

A new encryption system performs schemes that classical computers can use, but quantum computers cannot crack.

The Race to Develop the World's Best Quantum Tech
From ACM News

The Race to Develop the World's Best Quantum Tech

A few days before Christmas, U.S. President Donald Trump signed a bill into law that devotes more than US $1.2 billion to a national effort dedicated to quantum...

How to Encode a Secret Message in a Fingerprint
From ACM TechNews

How to Encode a Secret Message in a Fingerprint

Researchers have developed a method for constructing digital fingerprints that encode secret messages into the spiral points on the prints.

How Political Campaigns Weaponize Social Media Bots
From ACM News

How Political Campaigns Weaponize Social Media Bots

In the summer of 2017, a group of young political activists in the United Kingdom figured out how to use the popular dating app Tinder to attract new supporters...

This Tech Would Have Spotted the Secret Chinese Chip in Seconds
From ACM TechNews

This Tech Would Have Spotted the Secret Chinese Chip in Seconds

Researchers have developed a semiautomated system that could have identified in seconds malicious chips reportedly inserted into computer systems by the Chinese...

60 Years of DARPA's Favorite Toys
From ACM News

60 Years of DARPA's Favorite Toys

This year, the U.S. Defense Advanced Research Projects Agency (DARPA) turned 60. To celebrate, DARPA held a conference in Washington, D.C. One of the highlights...

This Lens-less Camera Is Built Specially for AI and Computer Vision Programs
From ACM News

This Lens-less Camera Is Built Specially for AI and Computer Vision Programs

Cameras used to be their own devices with lenses and film and trips to the drug store to get the pictures developed. Then, they disappeared into phones, tablets...

AI Drone Learns to Detect Brawls
From ACM TechNews

AI Drone Learns to Detect Brawls

Researchers used deep learning to develop a drone surveillance system that automatically detects small groups of people fighting each other.

Medical Imaging AI Software Is Vulnerable to Covert Attacks
From ACM TechNews

Medical Imaging AI Software Is Vulnerable to Covert Attacks

Deep learning neural network systems for analyzing medical images can be exploited by cyberattackers in ways that humans cannot detect, according to a new study...

Interpol's New Software Will Recognize Criminals by Their Voices
From ACM TechNews

Interpol's New Software Will Recognize Criminals by Their Voices

The International Criminal Police Organization is assessing software that matches samples of speech in phone calls or social media to voice recordings in a law...

Hiding Information in Plain Text
From ACM News

Hiding Information in Plain Text

Computer scientists have now invented a way to hide secret messages in ordinary text by imperceptibly changing the shapes of letters.

The Unhackable Envelope
From ACM TechNews

The Unhackable Envelope

Researchers have developed an envelope for hardware security modules that requires no battery and cannot be broken into without deleting its stored data.

Cracking Open the Black Box of AI with Cell Biology
From ACM News

Cracking Open the Black Box of AI with Cell Biology

The deep neural networks that power today's artificial intelligence systems work in mysterious ways.

Far From Radio Interference, the Square Kilometre Array Takes Root in South Africa and The australian outback
From ACM News

Far From Radio Interference, the Square Kilometre Array Takes Root in South Africa and The australian outback

Even in early winter, the sun is harsh in Western Australia's Murchison shire.

A Better Technique For Spotting Bugs in Self-Driving AI Could Save Lives
From ACM News

A Better Technique For Spotting Bugs in Self-Driving AI Could Save Lives

Most software bugs won't kill you.

To Secure the Internet of Things, We Must Build It Out of 'patchable' Hardware
From ACM TechNews

To Secure the Internet of Things, We Must Build It Out of 'patchable' Hardware

The security of the Internet of Things could depend on its constituent hardware being "patchable" so it can adapt to future threats, write several experts.

China Demonstrates Quantum Encryption By Hosting a Video Call
From ACM News

China Demonstrates Quantum Encryption By Hosting a Video Call

Chinese researchers have completed a practical demonstration of quantum key distribution, showing that it's possible to encrypt and send data between two locations...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account