acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


'Quantum-Safe' Crypto Hacked by 10-Year-Old PC
From ACM News

'Quantum-Safe' Crypto Hacked by 10-Year-Old PC

Many challenges still lie ahead for post-quantum cryptography.

Facebook, Twitter, Others Remove Pro-U.S. Influence Campaign
From ACM News

Facebook, Twitter, Others Remove Pro-U.S. Influence Campaign

It was the first time that an influence operation promoting U.S. interests abroad had been discovered and taken down from the social media platforms.

Oracle Faces Class-Action Lawsuit Over Tracking 5 Billion People
From ACM TechNews

Oracle Faces Class-Action Lawsuit Over Tracking 5 Billion People

A class-action lawsuit against U.S. multinational technology company Oracle claims it tracks and collects personal information on billions of people.

TikTok Browser Can Track Users' Keystrokes
From ACM TechNews

TikTok Browser Can Track Users' Keystrokes

A privacy researcherfound the TikTok video application's Web browser can track users' keystrokes.

Your Smartphone Could Recognize You by How You Hold It
From ACM TechNews

Your Smartphone Could Recognize You by How You Hold It

Researchers trained an artificial intelligence-powered algorithm to identify individuals based their hand vibrations when holding a smartphone.

Sloppy Software Patches Are a 'Disturbing Trend'
From ACM News

Sloppy Software Patches Are a 'Disturbing Trend'

The Zero Day Initiative has found a concerning uptick in security updates that fail to fix vulnerabilities.

The Road to 6G
From Communications of the ACM

The Road to 6G

Looking past 5G to sixth-generation wireless technology.

Flaw in VA's Medical Records Platform May Put Patients at Risk
From ACM TechNews

Flaw in VA's Medical Records Platform May Put Patients at Risk

Security researcher Zachary Minneker discovered a flaw in the U.S. Department of Veterans Affairs' VistA records platform and determined that hackers easily can...

Thinking Like a Cyber-Attacker to Protect User Data
From ACM TechNews

Thinking Like a Cyber-Attacker to Protect User Data

Researchers exploit computer processor's on-chip interconnect to launch side-channel attacks.

Thousands of GitHub Repositories Hacked to Include Malware
From ACM TechNews

Thousands of GitHub Repositories Hacked to Include Malware

Software developer Stephen Lacy identified a malicious URL in the code of an open source project on GitHub that he found through a Google search.

Zoom Used In Smuggled Code Attack
From ACM TechNews

Zoom Used In Smuggled Code Attack

Google Project Zero security researcher Ivan Fratric launched a remote code execution attack by exploiting the technology underlying Zoom and other applications...

The Hacking of Starlink Terminals Has Begun
From ACM TechNews

The Hacking of Starlink Terminals Has Begun

Lennert Wouters at Belgium's Katholieke Universiteit Leuven hacked SpaceX's Starlink network.

FEC Greenlights Google Plan to Loosen Spam Filters, Overcoming Democratic Challenge
From ACM News

FEC Greenlights Google Plan to Loosen Spam Filters, Overcoming Democratic Challenge

Under the pilot program, campaigns would be able to circumvent algorithmic sorting by tech companies that at times sends their emails to spam.

IoT RapperBot Malware Targeting Linux Servers via SSH Brute-Forcing Attack
From ACM TechNews

IoT RapperBot Malware Targeting Linux Servers via SSH Brute-Forcing Attack

Researchers at FortiGuard Labs reported that an Internet of Things (IoT) botnet malware identified in mid-June has been evolving rapidly.

Raising the Ramparts
From ACM News

Raising the Ramparts

Why the enterprise needs military-grade cybersecurity, too.

U.S. Space Force Tests Robot Dogs to Patrol Cape Canaveral
From ACM TechNews

U.S. Space Force Tests Robot Dogs to Patrol Cape Canaveral

The U.S. Space Force held a demonstration of dog-like quadruped unmanned ground vehicles for patrols at Cape Canaveral.

Can Foundation Models Help Us Achieve 'Perfect Secrecy'?
From ACM TechNews

Can Foundation Models Help Us Achieve 'Perfect Secrecy'?

Stanford University researchers are exploring whether emerging foundation models can help to realize the highest level of privacy, or "perfect secrecy."

Gootkit Loader Resurfaces with Updated Tactic to Compromise Targeted Computers
From ACM TechNews

Gootkit Loader Resurfaces with Updated Tactic to Compromise Targeted Computers

Researchers have found the operators of the Gootkit access-as-a-service malware now are using legal documents to get unsuspecting users to download them.

India Withdraws a Proposed Law on Data Protection
From ACM News

India Withdraws a Proposed Law on Data Protection

A number of lawyers and experts say measures to safeguard citizens online are badly needed, but the bill was criticized by both privacy advocates and tech companies...

Extreme Security for Users Targeted by Cyberattack
From ACM News

Extreme Security for Users Targeted by Cyberattack

Apple's Lockdown Mode provides serious security to individuals personally targeted by sophisticated attackers.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account