acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


High-Performance Computers Under Siege by Newly Discovered Backdoor
From ACM TechNews

High-Performance Computers Under Siege by Newly Discovered Backdoor

Researchers at Slovak security firm Eset said a newly discovered backdoor allows hackers to remotely execute arbitrary commands on some high-performance computer...

Google Says It's Too Easy for Hackers to Find New Security Flaws
From ACM News

Google Says It's Too Easy for Hackers to Find New Security Flaws

Attackers are exploiting the same types of software vulnerabilities over and over again, because companies often miss the forest for the trees

Google Pursues Plan to Remove Third-Party Cookies
From ACM TechNews

Google Pursues Plan to Remove Third-Party Cookies

Google is moving ahead with a plan to strip third-party cookies from its Chrome Web browser and replace them with privacy-friendly alternatives.

Quantum Computing Scientists Call for Ethical Guidelines
From ACM TechNews

Quantum Computing Scientists Call for Ethical Guidelines

Six quantum computing experts are raising ethical issues about the technology's potential to create new weapons and ramp up human genetic manipulation.

Researchers Propose Porcupine, a Compiler for Homomorphic Encryption
From ACM TechNews

Researchers Propose Porcupine, a Compiler for Homomorphic Encryption

A synthesizing compiler for homomorphic encryption can translate a plain-text unencrypted codebase into encrypted code on the fly.

When a Story is Breaking, AI Can Help Consumers Identify Fake News
From ACM TechNews

When a Story is Breaking, AI Can Help Consumers Identify Fake News

Rensselaer Polytechnic Institute researchers have determined that artificial intelligence can help assess news stories accurately, but only when a story is first...

Women Primed to Fill Cybersecurity Talent Gap
From ACM TechNews

Women Primed to Fill Cybersecurity Talent Gap

Cybersecurity analysts are in great demand thanks to the surge in remote work due to the pandemic; hiring more women can help narrow the talent gap.

DNSpooq Lets Attackers Poison DNS Cache Records
From ACM TechNews

DNSpooq Lets Attackers Poison DNS Cache Records

Researchers have uncovered seven vulnerabilities that affect Dnsmasq, a domain name system forwarding client for *NIX-based operating systems.

Moore's Law: What Comes Next?
From Communications of the ACM

Moore's Law: What Comes Next?

Moore's Law challenges point to changes in software.

The State of Virtual Reality Hardware
From Communications of the ACM

The State of Virtual Reality Hardware

Advances in VR hardware could finally take the technology mainstream.

Technological Responses to COVID-19
From Communications of the ACM

Technological Responses to COVID-19

Companies are finding new ways to enforce social distancing, clean public spaces, and provide substitutes for human workers.

Fake Collaboration Apps Steal Data as Staff Struggle with Home-Working Security
From ACM TechNews

Fake Collaboration Apps Steal Data as Staff Struggle with Home-Working Security

According to cybersecurity company Wandera's Cloud Security Report 2021, malware attacks increasingly targeted remote workers last year.

Hackers Used Four Zero-Days to Infect Windows, Android Devices
From ACM TechNews

Hackers Used Four Zero-Days to Infect Windows, Android Devices

Investigators with Google's Project Zero exploit research team uncovered a hacking campaign that used four zero-day exploits to install malware on Android and Windows...

Quantum Internet Signals Beamed Between Drones a Kilometer Apart
From ACM TechNews

Quantum Internet Signals Beamed Between Drones a Kilometer Apart

Researchers have sent entangled photons between two 35-kilogram drones located a kilometer apart, a development that could pave the way for quantum encryption. ...

Side-Channel Attack Can Recover Encryption Keys From Google Titan Security Keys
From ACM TechNews

Side-Channel Attack Can Recover Encryption Keys From Google Titan Security Keys

Researchers at French security company NinjaLab found a vulnerability impacting chips used in Google Titan and YubiKey hardware security keys.

Microsoft, Oracle and Salesforce Join Push for Digital Vaccination Credentials
From ACM News

Microsoft, Oracle and Salesforce Join Push for Digital Vaccination Credentials

In the U.S., there is no federal system consumers can use to get easy access to their immunization records online and establish their vaccination status for work...

Hack the Army Bug Bounty Challenge Asks Hackers to Find Vulnerabilities in Military Networks
From ACM TechNews

Hack the Army Bug Bounty Challenge Asks Hackers to Find Vulnerabilities in Military Networks

The Defense Digital Service and HackerOne are calling on military and civilian hackers to identify cybersecurity vulnerabilities in the U.S. Army's computer systems...

Just Think: The Outlook for BCI
From ACM News

Just Think: The Outlook for BCI

Where Brain-Computer Interfaces are headed.

Slouch or Slack Off, This 'Smart' Office Chair Cushion Will Record It
From ACM TechNews

Slouch or Slack Off, This 'Smart' Office Chair Cushion Will Record It

"Smart cushions" designed by a Chinese technology company and used in office chairs have engendered controversy over privacy and surveillance.

As Coronavirus Cases Surge, So Do Cyberattacks Against the Healthcare Sector
From ACM TechNews

As Coronavirus Cases Surge, So Do Cyberattacks Against the Healthcare Sector

Cybersecurity firm Check Point found a 45% increase in cyberattacks against the global healthcare sector since November, versus a 22% uptick against all worldwide...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account