acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectLegal Aspects
authorWired
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Hackers Can Clone Millions of Toyota, Hyundai, Kia Keys
From ACM TechNews

Hackers Can Clone Millions of Toyota, Hyundai, Kia Keys

Researchers found previously unknown vulnerabilities in encryption systems used by in-vehicle devices that communicate at close range with key fobs to unlock the...

The Secret History of Facial Recognition
From ACM News

The Secret History of Facial Recognition

Sixty years ago, a sharecropper's son invented a technology to identify faces. Then the record of his role all but vanished.

Hackers Can Mess With Voltages to Steal Intel Chips' Secrets
From ACM News

Hackers Can Mess With Voltages to Steal Intel Chips' Secrets

A new attack called Plundervolt gives attackers access to the sensitive data stored in a processor's secure enclave.

Map Shows All the Code Connections Between Russia's Hacker Groups
From ACM TechNews

Map Shows All the Code Connections Between Russia's Hacker Groups

Israeli cybersecurity firms Check Point and Intezer have charted Russian hackers' toolkits from wide-ranging analysis of 2,500 malware samples.

Google Wants to Help Tech Companies Know Less About You
From ACM News

Google Wants to Help Tech Companies Know Less About You

By releasing its homegrown differential privacy tool, Google will make it easier for any company to boost its privacy bona fides.

Algorithms Should’ve Made Courts More Fair. What Went Wrong?
From ACM News

Algorithms Should’ve Made Courts More Fair. What Went Wrong?

A 2011 Kentucky law requires judges to consult an algorithm when deciding whether defendants must post cash bail. More whites were allowed to go home, but not blacks...

Mysterious iOS Attack Changes Everything We Know About iPhone Hacking
From ACM TechNews

Mysterious iOS Attack Changes Everything We Know About iPhone Hacking

Google researchers discovered thousands of iPhones have been compromised with sophisticated spyware over the last two years, contradicting assumptions about the...

The WIRED Guide to Cyberwar
From ACM News

The WIRED Guide to Cyberwar

The threat of cyberwar looms over the future: a new dimension of conflict capable of leapfrogging borders and teleporting the chaos of war to civilians thousands...

Waze Data Can Help Predict Car Crashes, Cut Response Time
From ACM TechNews

Waze Data Can Help Predict Car Crashes, Cut Response Time

City leaders, academic researchers, and the U.S. Department of Transportation are working to predict car crashes and reduce emergency response times using data...

Intel Flaw Lets Hackers Siphon Secrets From Millions of PCs
From ACM TechNews

Intel Flaw Lets Hackers Siphon Secrets From Millions of PCs

Intel and a coalition of security researchers have identified a new vulnerability in Intel's chips which could permit the theft of sensitive data from central processing...

Machine Learning Can ­se Tweets to Spot Critical Security Flaws
From ACM News

Machine Learning Can ­se Tweets to Spot Critical Security Flaws

At the endless booths of this week's RSA security trade show in San Francisco, an overflowing industry of vendors will offer any visitor an ad nauseam array of...

Quantum Physics Could Protect the Grid From Hackers, Maybe
From ACM News

Quantum Physics Could Protect the Grid From Hackers, Maybe

Cybersecurity experts have sounded the alarm for years: Hackers are ogling the U.S. power grid.

How Russian Trolls ­sed Meme Warfare to Divide America
From ACM News

How Russian Trolls ­sed Meme Warfare to Divide America

There's a meme on Instagram, circulated by a group called "Born Liberal." A fist holds a cluster of strings, reaching down into people with television sets for...

Here's How Much Bots Drive Conversation During News Events
From ACM News

Here's How Much Bots Drive Conversation During News Events

Last week, as thousands of Central American migrants made their way northward through Mexico, walking a treacherous route toward the US border, talk of "the caravan...

Google Wants China. Will Chinese ­sers Want Google?
From ACM News

Google Wants China. Will Chinese ­sers Want Google?

Google CEO Sundar Pichai was upbeat Monday when he told WIRED about internal tests of a censored search engine designed to win approval from Chinese officials....

These New Tricks Can Outsmart Deepfake Videos, for Now
From ACM News

These New Tricks Can Outsmart Deepfake Videos, for Now

For weeks, computer scientist Siwei Lyu had watched his team's deepfake videos with a gnawing sense of unease.

The Ick of AI That Impersonates Humans
From ACM News

The Ick of AI That Impersonates Humans

Philip K. Dick was living a few miles north of San Francisco when he wrote Do Androids Dream of Electric Sheep?, which envisioned a world where artificially intelligent...

How Russian Spies Infiltrated Hotel Wi-Fi to Hack Victims ­p Close
From ACM News

How Russian Spies Infiltrated Hotel Wi-Fi to Hack Victims ­p Close

For years, the Kremlin's increasingly aggressive hackers have reached across the globe to hit targets with everything from simple phishing schemes to worms built...

Mobile Websites Can Tap Into Your Phone's Sensors Without Asking
From ACM News

Mobile Websites Can Tap Into Your Phone's Sensors Without Asking

When apps want to access data from your smartphone's motion or light sensors, they often make that capability clear.

Crispr's Epic Patent Fight Changed the Course of Biology
From ACM News

Crispr's Epic Patent Fight Changed the Course of Biology

After three bitter years and tens of millions of dollars in legal fees, the epic battle over who owns one of the most common methods for editing the DNA in any...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account