acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorNew Scientist
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Reddit Mentions May Help Predict Changes in Cryptocurrency Value
From ACM TechNews

Reddit Mentions May Help Predict Changes in Cryptocurrency Value

University of California, Riverside researchers identified a connection between cryptocurrency prices and the number of Reddit posts mentioning a currency in the...

Making Your Phone Screen Blurry Could Stop Snooping
From ACM TechNews

Making Your Phone Screen Blurry Could Stop Snooping

A new system can blur smartphone screens to prevent snooping.

Quantum Computers That Use 'Cat Qubits' May Make Fewer Errors
From ACM TechNews

Quantum Computers That Use 'Cat Qubits' May Make Fewer Errors

Researchers in France found so-called "cat qubits” (quantum bits) could reduce errors by quantum computers and accelerate the cracking of common encryption algorithms...

AI-Designed Invisibility Cloak Could Hide Small Communication Devices
From ACM TechNews

AI-Designed Invisibility Cloak Could Hide Small Communication Devices

Researchers used artificial intelligence to design an invisibility cloak to conceal antennas or small communication devices from infrared light or microwave detectors...

Apps Used as Alternatives to Prison in U.S. Have Privacy Flaws
From ACM TechNews

Apps Used as Alternatives to Prison in U.S. Have Privacy Flaws

Researchers found privacy flaws in apps used in the U.S. to track people waiting for immigration court dates, those in juvenile detention systems, and those on...

Your Smartphone Could Recognize You by How You Hold It
From ACM TechNews

Your Smartphone Could Recognize You by How You Hold It

Researchers trained an artificial intelligence-powered algorithm to identify individuals based their hand vibrations when holding a smartphone.

Fiber-Optic Cables Could Be Used for Spying
From ACM TechNews

Fiber-Optic Cables Could Be Used for Spying

Device can eavesdrop on people up to 1 km away using existing fiber-optic cables.

Seventy-Five Percent of the World's Top Websites Allow Bad Passwords
From ACM TechNews

Seventy-Five Percent of the World's Top Websites Allow Bad Passwords

Princeton University's Arvind Narayanan and colleagues found 75% of 120 top-ranked English-language websites permit weak passwords.

AIs Could Be Hacked with Undetectable Backdoors to Make Bad Decisions
From ACM TechNews

AIs Could Be Hacked with Undetectable Backdoors to Make Bad Decisions

Renegade staff theoretically could insert undetectable backdoors in third-party artificial intelligence (AI) algorithms, enabling hackers to commandeer the AIs...

Power Use Reveals Harmful Chips Hidden on Circuit Boards
From ACM TechNews

Power Use Reveals Harmful Chips Hidden on Circuit Boards

A circuit board's power consumption can reveal malicious tampering designed to facilitate Trojan attacks to steal sensitive data or crash a device when triggered...

Driverless Cars Can Be Tricked into Seeing Red Traffic Lights as Green
From ACM TechNews

Driverless Cars Can Be Tricked into Seeing Red Traffic Lights as Green

Researchers at China's Zhejiang University found driverless cars could be fooled into seeing red traffic lights as green.

Encryption Meant to Protect Against Quantum Hackers Is Easily Cracked
From ACM TechNews

Encryption Meant to Protect Against Quantum Hackers Is Easily Cracked

Ward Beullens at IBM Research Zurich in Switzerland easily cracked a cryptography algorithm touted as one of three contenders for a global standard against quantum...

People Are Bad at Spotting Fake LinkedIn Profiles Generated by AI
From ACM TechNews

People Are Bad at Spotting Fake LinkedIn Profiles Generated by AI

Scientists  found fake profiles produced by artificial intelligence on the business social network LinkedIn can easily deceive people.

Fake Faces Created by AI Look More Trustworthy than Real People
From ACM TechNews

Fake Faces Created by AI Look More Trustworthy than Real People

Researchers found that people have a hard time distinguishing images of human faces created by artificial intelligence from images of real faces.

Birthday Wishes Inadvertently Give Away Private Information Online
From ACM TechNews

Birthday Wishes Inadvertently Give Away Private Information Online

Researchers have determined that birthday wishes on Twitter can inadvertently expose private data that could jeopardize recipients' online security.

AI-Generated Deepfake Voices Can Fool Humans, Smart Assistants
From ACM TechNews

AI-Generated Deepfake Voices Can Fool Humans, Smart Assistants

Freely available voice-mimicking software can deceive people and voice-activated tools like smart assistants, according to University of Chicago scientists.

Smart Reporting Tool Could Combat Fake News on Encrypted Chat Apps
From ACM TechNews

Smart Reporting Tool Could Combat Fake News on Encrypted Chat Apps

Researchers at George Washington University say they have built a tool that would allow users to expose fake news without endangering their privacy. The Fuzzy Anonymous...

AI Can Detect Deepfake Face Because Its Pupils Have Jagged Edges
From ACM TechNews

AI Can Detect Deepfake Face Because Its Pupils Have Jagged Edges

A computer model developed by researchers at New York’s University of Albany can determine whether an image of a face is a deepfake by examining its pupils.

Almost No One Encrypts Their Emails Because It Is Too Much of a Hassle
From ACM TechNews

Almost No One Encrypts Their Emails Because It Is Too Much of a Hassle

A study of 81 million email messages sent from January 1994 to July 2021 found that only 0.06% of the emails were encrypted.

Google Can Take Two Months to Remove Malware Apps from App Store
From ACM TechNews

Google Can Take Two Months to Remove Malware Apps from App Store

It takes an average of 77 days from detection for Google to remove apps that may contain malware from the Google Play Store, accoriding to a recent analysis.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account