acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectLegal Aspects
authorZDNet
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Hackers Breach Greece's Top-Level Domain Registrar
From ACM TechNews

Hackers Breach Greece's Top-Level Domain Registrar

Researchers said Greece's top-level domain registrar has suffered a hacker breach, and identified the state-sponsored "Sea Turtle" hacker group as the perpetrator...

HSM Vulnerabilities Impact Banks, Cloud Providers, Governments
From ACM TechNews

HSM Vulnerabilities Impact Banks, Cloud Providers, Governments

Researchers have discovered vulnerabilities that can be exploited remotely to retrieve sensitive data stored inside Hardware Security Modules .

Machine Learning Sniffs Out Its Own Machine-Written Propaganda
From ACM TechNews

Machine Learning Sniffs Out Its Own Machine-Written Propaganda

Researchers have modified a neural network to create a natural language processing algorithm that generates, as well as detects, convincing fake articles.

Security Researchers Discover Linux Version of Winnti Malware
From ACM TechNews

Security Researchers Discover Linux Version of Winnti Malware

Security researchers have discovered a Linux version of Winnti, a malware used by Chinese government-sponsored hackers.

Researchers Warn Open Sky Drone Policy Poses Cybercriminal Risk
From ACM TechNews

Researchers Warn Open Sky Drone Policy Poses Cybercriminal Risk

Researchers warn of the potential for unregulated aerial drones to threaten citizens.

Security Flaws Found in 26 Low-End Cryptocurrencies
From ACM TechNews

Security Flaws Found in 26 Low-End Cryptocurrencies

Researchers have discovered two security flaws that impact 26 Proof of Stake cryptocurrencies.

Security Conference Will Let You Hack Tesla Car, Earn Cash Prizes
From ACM TechNews

Security Conference Will Let You Hack Tesla Car, Earn Cash Prizes

Security researchers attending the Pwn2Own CanSecWest security conference this March in Vancouver, Canada, will be incentivized to hack a Tesla Model 3 car.

Data Breaches, Cyberattacks Top Global Risks Alongside Natural Disasters, Climate Change
From ACM TechNews

Data Breaches, Cyberattacks Top Global Risks Alongside Natural Disasters, Climate Change

The World Economic Forum has listed large-scale cyberattacks and massive data breaches among the five most probable risks facing the world today.

Hyundai Develops Fingerprint Tech to Unlock and Start Cars
From ACM TechNews

Hyundai Develops Fingerprint Tech to Unlock and Start Cars

Hyundai Motor has developed a system that will allow drivers to unlock and start their vehicles using only their fingerprints.

Flaws in Self-Encrypting SSDs Let Attackers Bypass Disk Encryption
From ACM TechNews

Flaws in Self-Encrypting SSDs Let Attackers Bypass Disk Encryption

Researchers have found vulnerabilities in some solid-state drives that allow hackers to circumvent encryption and access local data without knowing the password...

Intel CP­s Impacted by New PortSmash Side-Channel Vulnerability
From ACM TechNews

Intel CP­s Impacted by New PortSmash Side-Channel Vulnerability

Researchers discovered a new vulnerability in Intel processors that can allow attackers to leak encrypted data from the internal process of a central processing...

Need to Fix an iPhone or Android Device? You Can Now Break DRM ­nder New ­.S. Rules
From ACM TechNews

Need to Fix an iPhone or Android Device? You Can Now Break DRM ­nder New ­.S. Rules

It is now legal in the U.S. for consumers and repair companies to break an electronic device's digital rights management protections in order to to repair it.

China Has Been "Hijacking the Vital Internet Backbone of Western Countries"
From ACM News

China Has Been "Hijacking the Vital Internet Backbone of Western Countries"

The Chinese government turned to a local ISP for intelligence gathering after it signed the Obama-Xi cyberpact in late 2015, the researchers say.

What is Cyberwar?
From ACM Opinion

What is Cyberwar?

At its core, cyberwarfare refers the use of digital attacks by one country or nation to disrupt the computer systems of another with the aim of create significant...

Can Graphical Passwords Keep ­s Secure Online?
From ACM TechNews

Can Graphical Passwords Keep ­s Secure Online?

Researchers from the Xi'an Jiaotong-Liverpool University in China have developed an authentication method that uses semantically linked images.

Tech Giants Hit by NSA Spying Slam Encryption Backdoors
From ACM News

Tech Giants Hit by NSA Spying Slam Encryption Backdoors

A coalition of Silicon Valley tech giants has doubled down on its criticism of encryption backdoors following a proposal that would give law enforcement access...

GitHub Hit With the Largest DDoS Attack Ever Seen
From ACM News

GitHub Hit With the Largest DDoS Attack Ever Seen

Distributed Denial of Service attackers have found a new way of magnifying their attacks, with experts warning that bigger attacks are likely.

Humans, Cover Your Mouths: Lip Reading Bots in the Wild
From ACM TechNews

Humans, Cover Your Mouths: Lip Reading Bots in the Wild

A new algorithm has outperformed professional human lip readers.

A 'big Science' Approach For Australian Cybersecurity Research?
From ACM TechNews

A 'big Science' Approach For Australian Cybersecurity Research?

The director of the Defense Science and Technology Group's Cyber and Electronic Warfare Division recommends a big-science approach to cybersecurity in Australia...

Norway Internet Voting Experiment Fails
From ACM TechNews

Norway Internet Voting Experiment Fails

Norway has ended a pilot online voting program. 
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account