acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorZDNet
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Malware Uses WiFi BSSID for Victim Identification
From ACM TechNews

Malware Uses WiFi BSSID for Victim Identification

A newly discovered malware strain collects an infected user's Basic Service Set Identifier, in order to ascertain the location of the user and their Wi-Fi access...

Farmers Get Their Own Security Advice as Cyberattacks Increase
From ACM TechNews

Farmers Get Their Own Security Advice as Cyberattacks Increase

The U.K.'s National Cyber Security Center has published guidance for farmers to help guard against cyberattacks.

Ransomware vs WFH: How Remote Working is Making Cyberattacks Easier to Pull Off
From ACM News

Ransomware vs WFH: How Remote Working is Making Cyberattacks Easier to Pull Off

This year has forced organizations to adapt quickly to enabling employees to work from home. That's creating 'chaos with no control' - which cyber criminals are...

Singapore Tightens Security Requirements for Home Routers
From ACM TechNews

Singapore Tightens Security Requirements for Home Routers

Beginning next April, home Wi-Fi routers sold in Singapore must meet new security requirements.

4G, 5G Networks Could Be Vulnerable to Exploit Due to 'Mishmash' of Old Technologies
From ACM TechNews

4G, 5G Networks Could Be Vulnerable to Exploit Due to 'Mishmash' of Old Technologies

Positive Technologies' Sergey Puzankov said that outstanding issues in the Signaling System 7  protocol continue to plague the telecommunications industry as it...

Australia's Report on Agtech Confirms Technology Can Lead to Fertile Future
From ACM TechNews

Australia's Report on Agtech Confirms Technology Can Lead to Fertile Future

A new report says emerging technologies could enhance the productivity, diversity, and profitability of Australia's agricultural sector.

This Is How Much Top Hackers Are Earning From Bug Bounties
From ACM TechNews

This Is How Much Top Hackers Are Earning From Bug Bounties

More than $44.75 million in bounties was awarded to hackers worldwide over the past year, up 86% year-on-year, according to HackerOne.

CISA: Chinese State Hackers Are Exploiting F5, Citrix, Pulse Secure, Exchange Bugs
From ACM TechNews

CISA: Chinese State Hackers Are Exploiting F5, Citrix, Pulse Secure, Exchange Bugs

An advisory from the Cybersecurity and Infrastructure Security Agency (CISA) warns of attacks against U.S. federal networks by hacker groups associated with China's...

Most Cybersecurity Reports Only Focus on the Cool Threats
From ACM TechNews

Most Cybersecurity Reports Only Focus on the Cool Threats

A study found just 82 of 629 commercial cybersecurity reports published in the last decade discuss threats to civil society, with the rest devoted to cybercrime...

Millions of WordPress Sites Are Being Probed, Attacked With Recent Plugin Bug
From ACM TechNews

Millions of WordPress Sites Are Being Probed, Attacked With Recent Plugin Bug

Defiant Inc. reports millions of WordPress sites have been attacked by hackers exploiting a zero-day vulnerability in the "File Manager" WordPress plugin.

Malware Gang Uses .NET Library to Generate Excel Docs That Bypass Security Checks
From ACM TechNews

Malware Gang Uses .NET Library to Generate Excel Docs That Bypass Security Checks

Security researchers at NVISO Labs discovered a malware gang is using a .NET library to create malicious Excel files.

Microsoft Pays $13.7 Million in Security Bug Bounties
From ACM TechNews

Microsoft Pays $13.7 Million in Security Bug Bounties

Microsoft has awarded $13.7 million to security researchers since July 2019 for reporting bugs in its software, which is triple the $4.4 million from the same period...

Evil AI: These are the 20 Most Dangerous Crimes that Artificial Intelligence will Create
From ACM News

Evil AI: These are the 20 Most Dangerous Crimes that Artificial Intelligence will Create

A new report tells us which criminal applications of AI we should really worry about.

BadPower Attack Corrupts Fast Chargers to Melt or Set Your Device on Fire
From ACM TechNews

BadPower Attack Corrupts Fast Chargers to Melt or Set Your Device on Fire

Chinese security researchers from Tencent's Xuanwu Lab said they can corrupt the firmware of fast chargers to cause damage to the items they charge. The BadPower...

Phishing Attacks: This Sophisticated Group Has Been Operating Undiscovered for at Least a Year
From ACM TechNews

Phishing Attacks: This Sophisticated Group Has Been Operating Undiscovered for at Least a Year

Cybersecurity researchers found a new phishing group targeting large companies worldwide, which may have been operating undiscovered for over a year.

São Paulo Subway Facial Recognition System Slammed Over User Data Security, Privacy
From ACM TechNews

São Paulo Subway Facial Recognition System Slammed Over User Data Security, Privacy

Consumer rights groups say the agency operating the subway system in São Paulo, Brazil, has not shown that a new facial recognition technology platform protects...

Windows 10 2004 Update Block Confusion: 'Your PC Settings Aren't Supported'
From ACM News

Windows 10 2004 Update Block Confusion: 'Your PC Settings Aren't Supported'

Hardware drivers still appear to be causing havoc for users trying to upgrade to Windows 10 version 2004.

Singapore Issues Covid-19 Contact Tracing Wearables to 'Vulnerable Seniors'
From ACM TechNews

Singapore Issues Covid-19 Contact Tracing Wearables to 'Vulnerable Seniors'

Covid-19 contact tracing wearables are being issued to Singapore's "most vulnerable seniors," who are not digitally connected and at higher risk of catching the...

Microsoft Releases Emergency Security Update to Fix Two Bugs in Windows Codecs
From ACM News

Microsoft Releases Emergency Security Update to Fix Two Bugs in Windows Codecs

Security updates have been silently deployed to customers on Tuesday through the Windows Store app.

Lucifer: Devilish Malware That Abuses Critical Vulnerabilities on Windows Machines
From ACM TechNews

Lucifer: Devilish Malware That Abuses Critical Vulnerabilities on Windows Machines

Researchers discovered a new variant of a powerful cryptojacking and DDoS-based malware, called Lucifer, which infects Windows machines by exploiting their vulnerabilities...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account