acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorWired
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Split-Second 'Phantom' Images Can Fool Tesla's Autopilot
From ACM TechNews

Split-Second 'Phantom' Images Can Fool Tesla's Autopilot

Researchers at Israel's Ben Gurion University of the Negev found they could fool Tesla's Autopilot driver-assistance systems into automatically reacting without...

The Cyber-Avengers Protecting Hospitals From Ransomware
From ACM TechNews

The Cyber-Avengers Protecting Hospitals From Ransomware

The Cyber Threat Intelligence League aims to protect hospitals and health systems around the world from cyberattacks as they deal with Covid-19 cases.

Kids' Smartwatches a Security Nightmare, Despite Years of Warnings
From ACM TechNews

Kids' Smartwatches a Security Nightmare, Despite Years of Warnings

Researchers at Germany's Münster University of Applied Sciences found smartwatch brands marketed for children are exploitable, based on years of similar findings...

Google Will Delete Your Data by Default—in 18 Months
From ACM News

Google Will Delete Your Data by Default—in 18 Months

Starting Wednesday, the search giant will make a previously opt-in auto-delete feature the norm.

Spies Can Eavesdrop by Watching a Light Bulb's Vibrations
From ACM TechNews

Spies Can Eavesdrop by Watching a Light Bulb's Vibrations

Researchers  have developed a long-distance eavesdropping method that exploits vibrations on the glass surface of a light bulb's interior.

The Confessions of Marcus Hutchins, the Hacker Who Saved the Internet
From ACM News

The Confessions of Marcus Hutchins, the Hacker Who Saved the Internet

At 22, he single-handedly put a stop to the worst cyberattack the world had ever seen. Then he was arrested by the FBI. This is his untold story.

Hackers Can Clone Millions of Toyota, Hyundai, Kia Keys
From ACM TechNews

Hackers Can Clone Millions of Toyota, Hyundai, Kia Keys

Researchers found previously unknown vulnerabilities in encryption systems used by in-vehicle devices that communicate at close range with key fobs to unlock the...

The Secret History of Facial Recognition
From ACM News

The Secret History of Facial Recognition

Sixty years ago, a sharecropper's son invented a technology to identify faces. Then the record of his role all but vanished.

Intel Patching the Patch for the Patch for 'Zombieload' Flaw
From ACM TechNews

Intel Patching the Patch for the Patch for 'Zombieload' Flaw

Intel said it will release yet another patch for a microarchitectural data sampling vulnerability that allows hackers to fool microprocessors into exposing protected...

Hackers Can Mess With Voltages to Steal Intel Chips' Secrets
From ACM News

Hackers Can Mess With Voltages to Steal Intel Chips' Secrets

A new attack called Plundervolt gives attackers access to the sensitive data stored in a processor's secure enclave.

Decades-Old Code Putting Millions of Critical Devices at Risk
From ACM TechNews

Decades-Old Code Putting Millions of Critical Devices at Risk

Recently discovered vulnerabilities in a nearly 20-year-old industry standard network protocol from Interpeak could potentially make millions of devices exploitable...

Map Shows All the Code Connections Between Russia's Hacker Groups
From ACM TechNews

Map Shows All the Code Connections Between Russia's Hacker Groups

Israeli cybersecurity firms Check Point and Intezer have charted Russian hackers' toolkits from wide-ranging analysis of 2,500 malware samples.

Google Wants to Help Tech Companies Know Less About You
From ACM News

Google Wants to Help Tech Companies Know Less About You

By releasing its homegrown differential privacy tool, Google will make it easier for any company to boost its privacy bona fides.

Mysterious iOS Attack Changes Everything We Know About iPhone Hacking
From ACM TechNews

Mysterious iOS Attack Changes Everything We Know About iPhone Hacking

Google researchers discovered thousands of iPhones have been compromised with sophisticated spyware over the last two years, contradicting assumptions about the...

The WIRED Guide to Cyberwar
From ACM News

The WIRED Guide to Cyberwar

The threat of cyberwar looms over the future: a new dimension of conflict capable of leapfrogging borders and teleporting the chaos of war to civilians thousands...

How Facebook Catches Bugs in Its 100 Million Lines of Code
From ACM News

How Facebook Catches Bugs in Its 100 Million Lines of Code

For the past four years, Facebook has quietly used a homegrown tool called Zoncolan to find bugs in its massive codebase.

A Zoom Flaw Gives Hackers Easy Access to Your Webcam
From ACM TechNews

A Zoom Flaw Gives Hackers Easy Access to Your Webcam

Hackers can exploit vulnerabilities in the Zoom videoconferencing desktop app to commandeer a user's Webcam, a security researcher warns.

6 ­nexpected Places Hackers Can Find Your Information
From ACM News

6 ­nexpected Places Hackers Can Find Your Information

Sharing facts like your birthday or your parents' names can open you up to identity theft.

Intel Flaw Lets Hackers Siphon Secrets From Millions of PCs
From ACM TechNews

Intel Flaw Lets Hackers Siphon Secrets From Millions of PCs

Intel and a coalition of security researchers have identified a new vulnerability in Intel's chips which could permit the theft of sensitive data from central processing...

Forget about Artificial Intelligence, Extended Intelligence is the Future
From ACM News

Forget about Artificial Intelligence, Extended Intelligence is the Future

We should challenge the cult of Singularity. Artificial Intelligence won't take over the world.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account