acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


CISA Adds Google, Microsoft and QNAP Bugs to Exploited Vulnerabilities List
From ACM News

CISA Adds Google, Microsoft and QNAP Bugs to Exploited Vulnerabilities List

CISA has added 15 vulnerabilities to its catalog in April.

Ukraine Thwarts Cyberattack on Electric Grid, Officials Say
From ACM News

Ukraine Thwarts Cyberattack on Electric Grid, Officials Say

The attack, which was set for last Friday, used software similar to the 'industroyer' code used in a 2016 hack of Kyiv's grid, experts noted.

Satellite Modems Nexus of Worst Cyberattack of Ukraine War
From ACM TechNews

Satellite Modems Nexus of Worst Cyberattack of Ukraine War

A cyberattack anchored on a satellite network owned by U.S-based Viasat and used by Ukraine's government and military underscores the vulnerability of commercial...

Craig Newmark Philanthropies Pledges $50 Million to Cyber Civil Defense
From ACM News

Craig Newmark Philanthropies Pledges $50 Million to Cyber Civil Defense

The Cyber Civil Defense will focus on basic cyber education and literacy for people and small businesses, will help people get jobs cybersecurity, and work with...

How Ukraine Has Defended Itself Against Cyberattacks: Lessons for the U.S.
From ACM News

How Ukraine Has Defended Itself Against Cyberattacks: Lessons for the U.S.

In Ukraine in recent years, hackers entered poorly protected networks by techniques as simple as guessing passwords or intercepting their use on unsecure computers...

U.S. FBI Says It Disrupted Russian Hackers
From ACM TechNews

U.S. FBI Says It Disrupted Russian Hackers

U.S. officials said the Federal Bureau of Investigation had seized control of thousands of routers and firewall appliances from Russian hackers.

Hackers Target Bridges Between Blockchains for Crypto Heists
From ACM TechNews

Hackers Target Bridges Between Blockchains for Crypto Heists

Hackers pulled off a $540-million cryptocurrency heist by exploiting Ronin Network software that lets players of the online game "Axie Infinity" transfer digital...

The Senate Bill That Has Big Tech Scared
From ACM News

The Senate Bill That Has Big Tech Scared

The proposal would stop the biggest platforms from giving themselves an advantage over the little guys. Who's afraid of a little competition?

Facial Recognition Goes to War
From ACM TechNews

Facial Recognition Goes to War

Hoan Ton-That enlisted his facial recognition company Clearview AI in Russia’s war on Ukraine by tapping its technology to help bring some clarity to the conflict...

Brokenwire Hack Could Let Remote Attackers Disrupt Electric Vehicle Charging
From ACM TechNews

Brokenwire Hack Could Let Remote Attackers Disrupt Electric Vehicle Charging

Researchers have identified a method for attacking the Combined Charging System and interrupting electric vehicle charging sessions.

Google Pulls Apps that May Have Harvested Data from Millions of Android Devices
From ACM News

Google Pulls Apps that May Have Harvested Data from Millions of Android Devices

The apps took users' precise location, email, phone numbers, and more, researchers said.

Europe Is Building a Huge International Facial Recognition System
From ACM News

Europe Is Building a Huge International Facial Recognition System

Lawmakers advance proposals to let police forces across the EU link their photo databases—which include millions of pictures of people's faces.

Apple Rushes Out Patches for Zero-Days Threatening iOS, macOS Users
From ACM TechNews

Apple Rushes Out Patches for Zero-Days Threatening iOS, macOS Users

Apple recently released patches for two critical zero-day vulnerabilities discovered by an anonymous researcher that affect the operating systems of iPhones, iPads...

U.S. Disrupts Prolific Botnet Controlled by Russian Military
From ACM News

U.S. Disrupts Prolific Botnet Controlled by Russian Military

U.S. officials worked with law enforcement in the U.K., and network security company WatchGuard, to analyze the malware and develop detection and remediation tools...

Hackers Target Customers of 8 Malaysian Banks
From ACM News

Hackers Target Customers of 8 Malaysian Banks

According to Slovak security firm ESET, the malicious apps are tied to websites spoofing legitimate services in Malaysia, including six clearing services and a...

First, There Were Bug Bounties. Now, Here Come the Bias Bounties
From ACM News

First, There Were Bug Bounties. Now, Here Come the Bias Bounties

Offering rewards for the identification of bias in algorithms.

Pinterest Bans All Climate Misinformation
From ACM News

Pinterest Bans All Climate Misinformation

The image-focused social network says it will take down content that distorts or denies facts of climate crisis.

You're Still Being Tracked on the Internet, Just in a Different Way
From ACM News

You're Still Being Tracked on the Internet, Just in a Different Way

Apple and Google are pushing privacy changes, but a shift in digital tracking is giving some platforms a bigger advertising advantage.

Researchers Identify 'Master Problem' Underlying All Cryptography
From ACM News

Researchers Identify 'Master Problem' Underlying All Cryptography

The existence of secure cryptography depends on one of the oldest questions in computational complexity.

Google Bans Apps With Hidden Data-Harvesting Software
From ACM News

Google Bans Apps With Hidden Data-Harvesting Software

Code placed in consumer-facing apps is tied to U.S. national-security contractors, documents show.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account