acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectPerformance And Reliability
authorZDNet
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Remote Work is the New Normal, but the Tech Problems Won't Go Away
From ACM News

Remote Work is the New Normal, but the Tech Problems Won't Go Away

A new study finds that while many businesses successfully switched to telecommuting overnight, some serious fine-tuning is needed if WFH is to become permanent....

Robot Usage is Soaring During  Pandemic
From ACM News

Robot Usage is Soaring During Pandemic

Conditions are ideal for a massive adoption boost to robotic and software automation technologies.

São Paulo Subway Facial Recognition System Slammed Over User Data Security, Privacy
From ACM TechNews

São Paulo Subway Facial Recognition System Slammed Over User Data Security, Privacy

Consumer rights groups say the agency operating the subway system in São Paulo, Brazil, has not shown that a new facial recognition technology platform protects...

Microsoft Releases Emergency Security Update to Fix Two Bugs in Windows Codecs
From ACM News

Microsoft Releases Emergency Security Update to Fix Two Bugs in Windows Codecs

Security updates have been silently deployed to customers on Tuesday through the Windows Store app.

Lucifer: Devilish Malware That Abuses Critical Vulnerabilities on Windows Machines
From ACM TechNews

Lucifer: Devilish Malware That Abuses Critical Vulnerabilities on Windows Machines

Researchers discovered a new variant of a powerful cryptojacking and DDoS-based malware, called Lucifer, which infects Windows machines by exploiting their vulnerabilities...

Robots Will Take 50 Million Jobs in the Next Decade. These Are the Skills You'll Need to Stay Employed
From ACM News

Robots Will Take 50 Million Jobs in the Next Decade. These Are the Skills You'll Need to Stay Employed

A new report finds that automation will take over a significant part of work activities in Europe by 2030.

Australians Urged to Take Up Mental Health Telehealth, Put On 'Digital Sunscreen'
From ACM TechNews

Australians Urged to Take Up Mental Health Telehealth, Put On 'Digital Sunscreen'

Since the Australian government announced it would fast-track digital alternatives to in-person medical care, a million mental health telehealth consultations have...

Cybersecurity Staff Are Being Transferred to IT Support, Adding to the Risk of Data Breaches
From ACM TechNews

Cybersecurity Staff Are Being Transferred to IT Support, Adding to the Risk of Data Breaches

Nearly half of 256 cybersecurity professionals polled reported having been reassigned to general IT tasks, due to the global COVID-19 outbreak.

Hacking Victims Are Uncovering Cyberattacks Faster; GDPR Is the Reason Why
From ACM TechNews

Hacking Victims Are Uncovering Cyberattacks Faster; GDPR Is the Reason Why

GDPR has been linked to quicker cyberattack discovery times in the European Union. 

Hundreds of Millions of Cable Modems Vulnerable to Cable Haunt Vulnerability
From ACM TechNews

Hundreds of Millions of Cable Modems Vulnerable to Cable Haunt Vulnerability

Danish researchers reported a security vulnerability affecting cable modems that use Broadcom chips, which is believed to impact about 200 million cable modems...

Apple Opens Public Bug Bounty Program, Publishes Rules
From ACM TechNews

Apple Opens Public Bug Bounty Program, Publishes Rules

Apple has formally opened its bug bounty program to all researchers and outlined the program's rules on its website. The maximum available bounty is $1.5 million...

Attackers Using WhatsApp MP4 Video Files Vulnerability Can Remotely Execute Code
From ACM TechNews

Attackers Using WhatsApp MP4 Video Files Vulnerability Can Remotely Execute Code

Facebook has reported a vulnerability in WhatsApp messaging software that allows malefactors to conduct denial-of-service or remote code execution attacks.

World's Fastest Supercomputers Hit Higher Speeds with Linux
From ACM TechNews

World's Fastest Supercomputers Hit Higher Speeds with Linux

The latest Top500 supercomputer ratings found the Oak Ridge National Laboratory's Summit system topping the list with a High-Performance Linpack benchmark of 148...

Canberra Gives AU$32m for Autonomous Decision-Making Research
From ACM TechNews

Canberra Gives AU$32m for Autonomous Decision-Making Research

The Australian government is allocating AU$31.8 million (about US$21.5 million) to the Australian Research Council to study responsible, ethical, and inclusive...

COBOL Turns 60: Why It Will Outlive Us All
From ACM News

COBOL Turns 60: Why It Will Outlive Us All

In the beginning, there was machine languages and assembler. Neither was easy to use, but then along came COBOL, and everything changed.

Mobile Malware Attacks are Booming in 2019: These are the Most Common Threats
From ACM TechNews

Mobile Malware Attacks are Booming in 2019: These are the Most Common Threats

Malware attacks against mobile devices, especially Android handsets, have ballooned this year.

Hackers Breach Greece's Top-Level Domain Registrar
From ACM TechNews

Hackers Breach Greece's Top-Level Domain Registrar

Researchers said Greece's top-level domain registrar has suffered a hacker breach, and identified the state-sponsored "Sea Turtle" hacker group as the perpetrator...

Google's Language Techniques Help O2 Czech Republic Reveal Network Secrets
From ACM TechNews

Google's Language Techniques Help O2 Czech Republic Reveal Network Secrets

Word2vec, a neural network technique developed to understand human languages, also can interpret raw cell tower data.

Petaflop Systems Dominate the Supercomputer Landscape
From ACM TechNews

Petaflop Systems Dominate the Supercomputer Landscape

For the first time, every entry in this year's TOP500 list delivers petaflop-level capabilities.

HSM Vulnerabilities Impact Banks, Cloud Providers, Governments
From ACM TechNews

HSM Vulnerabilities Impact Banks, Cloud Providers, Governments

Researchers have discovered vulnerabilities that can be exploited remotely to retrieve sensitive data stored inside Hardware Security Modules .
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account