acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Disaster Apps Share Personal Data in Violation of Their Privacy Policies
From ACM TechNews

Disaster Apps Share Personal Data in Violation of Their Privacy Policies

Popular disaster applications are violating their privacy policies by continuing to track users' whereabouts, or providing personal information to third parties...

Schools Struggling to Stay Open Get Hit by Ransomware Attacks
From ACM TechNews

Schools Struggling to Stay Open Get Hit by Ransomware Attacks

Schools struggling to stay open during the Covid-19 pandemic are being targeted by ransomware, as hackers threaten to post sensitive student information online....

'Extremely Aggressive' Internet Censorship Spreads in the World's Democracies
From ACM TechNews

'Extremely Aggressive' Internet Censorship Spreads in the World's Democracies

University of Michigan researchers used an automated censorship tracking system to demonstrate that online censorship is proliferating in even the freest countries...

How to Make AI Less Biased
From ACM TechNews

How to Make AI Less Biased

Academic researchers and the technology industry are working to eliminate bias from artificial intelligence systems.

 Future Series: Cybersecurity, Emerging Technology and Systemic Risk
From ACM News

Future Series: Cybersecurity, Emerging Technology and Systemic Risk

Unless action is taken now, by 2025 next generation technology, on which the world will increasingly rely, has the potential to overwhelm the defences of the global...

Computer Scientists Launch Counteroffensive Against Video Game Cheaters
From ACM TechNews

Computer Scientists Launch Counteroffensive Against Video Game Cheaters

University of Texas at Dallas computer scientists have developed a countermeasure against video game cheaters.

Computer Scientists Achieve 'Crown Jewel' of Cryptography
From ACM News

Computer Scientists Achieve 'Crown Jewel' of Cryptography

A cryptographic master tool called indistinguishability obfuscation has for years seemed too good to be true. Three researchers have figured out that it can work...

Spoofing the Spoofers
From ACM News

Spoofing the Spoofers

Security deception software gets an upgrade.

Tricking Fake News Detectors With Malicious User Comments
From ACM TechNews

Tricking Fake News Detectors With Malicious User Comments

Researchers at the Pennsylvania State University have demonstrated how fake news detectors can be manipulated through user comments.

'Sneakernet' Helps Election Officials Process Results
From ACM TechNews

'Sneakernet' Helps Election Officials Process Results

U.S. election officials used voting machines and other devices linked to the "sneakernet" to process results from Tuesday's elections.

Software Can Spy on What You Type in Video Calls by Tracking Your Arms
From ACM TechNews

Software Can Spy on What You Type in Video Calls by Tracking Your Arms

A new model can track the movement of the shoulders and arms of a person typing during a video call to determine what they are typing.

Regulation of AI Remains Elusive
From ACM News

Regulation of AI Remains Elusive

The U.S. and EU are considering regulations on artificial intelligence, but none have been implemented...yet.

NASA's New Rocket Would be the Most Powerful Ever. But it's the Software that has Some Officials Worried.
From ACM News

NASA's New Rocket Would be the Most Powerful Ever. But it's the Software that has Some Officials Worried.

The SLS software concerns are the latest red flags for a program that has struggled to overcome cost overruns and setbacks.

Hacker Releases Georgia County Election Data After Ransom Not Paid
From ACM TechNews

Hacker Releases Georgia County Election Data After Ransom Not Paid

A computer hacker publicly released election-related files from Hall County, GA, after county officials failed to pay a ransom.

The Algorithm That Could Get You Back in the Office
From ACM TechNews

The Algorithm That Could Get You Back in the Office

As company offices reopen, some are using software to help them shuffle employees, schedule meetings, map office hot spots, and practice social distancing.

Website Predicts Likelihood of Cyberattacks Between Nations
From ACM TechNews

Website Predicts Likelihood of Cyberattacks Between Nations

Computer scientists have created a database that aims to predict the likelihood of cyberattacks between nations.

Officials Warn of Cyberattacks on Hospitals as Virus Cases Spike
From ACM News

Officials Warn of Cyberattacks on Hospitals as Virus Cases Spike

Government officials warned that hackers were seeking to hold American hospitals' data hostage in exchange for ransom payments.

National Guard Called in to Thwart Cyberattack in Louisiana Weeks Before Election
From ACM TechNews

National Guard Called in to Thwart Cyberattack in Louisiana Weeks Before Election

The Louisiana National Guard has been called in to investigate a series of cyberattacks aimed at small government offices across the state.

Ransomware vs WFH: How Remote Working is Making Cyberattacks Easier to Pull Off
From ACM News

Ransomware vs WFH: How Remote Working is Making Cyberattacks Easier to Pull Off

This year has forced organizations to adapt quickly to enabling employees to work from home. That's creating 'chaos with no control' - which cyber criminals are...

Singapore Tightens Security Requirements for Home Routers
From ACM TechNews

Singapore Tightens Security Requirements for Home Routers

Beginning next April, home Wi-Fi routers sold in Singapore must meet new security requirements.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account