acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectLegal Aspects
authorZDNet
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Supercomputers Hacked Across Europe to Mine Cryptocurrency
From ACM TechNews

Supercomputers Hacked Across Europe to Mine Cryptocurrency

Hackers have compromised multiple supercomputers in the U.K., Germany, Switzerland, and possibly Spain with cryptocurrency-mining malware.

Cybersecurity Staff Are Being Transferred to IT Support, Adding to the Risk of Data Breaches
From ACM TechNews

Cybersecurity Staff Are Being Transferred to IT Support, Adding to the Risk of Data Breaches

Nearly half of 256 cybersecurity professionals polled reported having been reassigned to general IT tasks, due to the global COVID-19 outbreak.

Hacker Group Is Eavesdropping on Corporate Email, FTP Traffic
From ACM TechNews

Hacker Group Is Eavesdropping on Corporate Email, FTP Traffic

The Chinese security firm Qihoo 360 reports that a hacker group has been eavesdropping on corporate networks since at least early December.

Crypto-Mining Botnet Has Been Hijacking MSSQL Servers for Almost Two Years
From ACM TechNews

Crypto-Mining Botnet Has Been Hijacking MSSQL Servers for Almost Two Years

A malware botnet has been launching brute-force attacks against Microsoft SQL databases for nearly two years.

Hacking Victims Are Uncovering Cyberattacks Faster; GDPR Is the Reason Why
From ACM TechNews

Hacking Victims Are Uncovering Cyberattacks Faster; GDPR Is the Reason Why

GDPR has been linked to quicker cyberattack discovery times in the European Union. 

The Top 10 Software Flaws Used by Crooks
From ACM TechNews

The Top 10 Software Flaws Used by Crooks

Researchers at cybersecurity firm Recorded Future report that eight of the top 10 software flaws most commonly exploited last year were associated with Microsoft...

Hundreds of Millions of Cable Modems Vulnerable to Cable Haunt Vulnerability
From ACM TechNews

Hundreds of Millions of Cable Modems Vulnerable to Cable Haunt Vulnerability

Danish researchers reported a security vulnerability affecting cable modems that use Broadcom chips, which is believed to impact about 200 million cable modems...

Chinese Hacker Group Caught Bypassing 2FA
From ACM TechNews

Chinese Hacker Group Caught Bypassing 2FA

Dutch cybersecurity firm Fox-IT said in a report that a hacker group associated with the Chinese government has been bypassing two-factor authentication (2FA) in...

Most Brazilians Believe Companies Don't Protect Their Personal Data
From ACM TechNews

Most Brazilians Believe Companies Don't Protect Their Personal Data

Among the findings of a Harris Poll survey of 11,000 consumers in 11 countries was that nearly all Brazilians feel companies are not adequately protecting their...

Mozilla Doubles Payouts as It Tries to Attract Software Vulnerability Hunters
From ACM TechNews

Mozilla Doubles Payouts as It Tries to Attract Software Vulnerability Hunters

Mozilla has increased payouts for its bug bounty program while adding new websites and services to the list in order to draw more interest from bug hunters.

Australia Releases Draft IoT Cybersecurity Code of Practice
From ACM TechNews

Australia Releases Draft IoT Cybersecurity Code of Practice

The Australian government has issued a draft code of practice for Internet of Things cybersecurity, with a public consultation to run until March 1, 2020.

CPDoS Attack Can Poison CDNs to Deliver Error Pages Instead of Legitimate Sites
From ACM TechNews

CPDoS Attack Can Poison CDNs to Deliver Error Pages Instead of Legitimate Sites

Researchers  in Germany discovered a new type of Web attack that can compromise content delivery networks into caching and then serving error pages instead of legitimate...

Canberra Gives AU$32m for Autonomous Decision-Making Research
From ACM TechNews

Canberra Gives AU$32m for Autonomous Decision-Making Research

The Australian government is allocating AU$31.8 million (about US$21.5 million) to the Australian Research Council to study responsible, ethical, and inclusive...

Cybersecurity Giants to Combat Cyberthreats Under OASIS Umbrella
From ACM TechNews

Cybersecurity Giants to Combat Cyberthreats Under OASIS Umbrella

IBM, McAfee, and 16 more firms have launched an effort to address fragmentation and interoperability problems in cybersecurity.

Academics Find Vulnerabilities in Android's VoIP Components
From ACM TechNews

Academics Find Vulnerabilities in Android's VoIP Components

Scientists at China's OPPO ZIWU Cyber Security Lab, the Chinese University of Hong Kong, and Singapore Management University identified eight flaws in Android's...

IBM Hackathon Winner Helps Fight Rash of Wasted Food
From ACM TechNews

IBM Hackathon Winner Helps Fight Rash of Wasted Food

A group called FreShip was named the winner of IBM’s Food Waste Developer Challenge, a hackathon that tasked U.S. developers to create food-waste-combatting solutions...

PDFex Attack Can Exfiltrate Data from Encrypted PDF Files
From ACM TechNews

PDFex Attack Can Exfiltrate Data from Encrypted PDF Files

Researchers in Germany have developed a new attack that can extract and steal data from encrypted Portable Document Format (PDF)  files, sometimes without user...

Microsoft Poses Threat to Germany's Digital Sovereignty, Warns Study
From ACM TechNews

Microsoft Poses Threat to Germany's Digital Sovereignty, Warns Study

An analysis by PricewaterhouseCoopers has confirmed that the German government is too dependent on the software of just a few software providers.

One in Five U.K. Schools Says Students Have Broken Into Computer Systems
From ACM TechNews

One in Five U.K. Schools Says Students Have Broken Into Computer Systems

A cybersecurity audit found 21% of 430 U.K. schools had their computers, networks, or servers hacked by students.

Mobile Malware Attacks are Booming in 2019: These are the Most Common Threats
From ACM TechNews

Mobile Malware Attacks are Booming in 2019: These are the Most Common Threats

Malware attacks against mobile devices, especially Android handsets, have ballooned this year.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account