acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Russians Who Pose Election Threat Have Hacked Nuclear Plants and Power Grid
From ACM News

Russians Who Pose Election Threat Have Hacked Nuclear Plants and Power Grid

The hacking group, Energetic Bear, is among Russia's stealthiest. It appears to be casting a wide net to find useful targets ahead of the election, experts said...

The U.S.-China Conflict Over Chips Is About to Get Uglier
From ACM News

The U.S.-China Conflict Over Chips Is About to Get Uglier

Politics is roiling the semiconductor business model, sparking a drive for more autonomy from the U.S. to China, Europe and Japan.

Cybersecurity Company Finds Hacker Selling Info on 186 Million U.S. Voters
From ACM TechNews

Cybersecurity Company Finds Hacker Selling Info on 186 Million U.S. Voters

Cybersecurity company Trustwave says it discovered a hacker selling personally identifying information on 245 million Americans, including voter registration data...

The Police Can Probably Break Into Your Phone
From ACM TechNews

The Police Can Probably Break Into Your Phone

Washington DC-based nonprofit Upturn found law enforcement officials regularly break into encrypted smartphones, and police in all U.S. states have phone-hacking...

Terahertz Networks Move Closer to Reality
From Communications of the ACM

Terahertz Networks Move Closer to Reality

The desire for faster, higher-frequency wireless networking is a constant. Terahertz technology could deliver large gains.

Cyber Command Sought to Disrupt World's Largest Botnet, Hoping to Reduce Its Potential Impact on the Election
From ACM TechNews

Cyber Command Sought to Disrupt World's Largest Botnet, Hoping to Reduce Its Potential Impact on the Election

U.S. Cyber Command (CyberCom) has launched a campaign to temporarily disrupt the world's largest botnet, in order to mitigate its potential interference in the...

Hackers Targeting IoT Devices With a P2P Botnet Malware
From ACM TechNews

Hackers Targeting IoT Devices With a P2P Botnet Malware

Qihoo 360's Netlab security team has discovered the HEH Botnet, which hijacks Internet-connected smart devices to carry out nefarious tasks.

Experts: Florida Voting Machines Ripe for Foreign Hackers
From ACM TechNews

Experts: Florida Voting Machines Ripe for Foreign Hackers

Computer scientists have expressed concerns about the security of voting machines used in 49 Florida counties.

Visa, JPMorgan Already Preparing for Potential Quantum Cyberattacks
From ACM TechNews

Visa, JPMorgan Already Preparing for Potential Quantum Cyberattacks

Researchers at Visa Inc. and JPMorgan Chase & Co. are developing new processes to try to thwart eventual quantum computing cyberattacks.

Buenos Aires Using Facial Recognition System That Tracks Child Suspects, Rights Group Says
From ACM TechNews

Buenos Aires Using Facial Recognition System That Tracks Child Suspects, Rights Group Says

Human Rights Watch says Buenos Aires is using a facial recognition system connected to a database that includes child suspects and is publishing warrants for their...

Split-Second 'Phantom' Images Can Fool Tesla's Autopilot
From ACM News

Split-Second 'Phantom' Images Can Fool Tesla's Autopilot

Researchers found they could stop a Tesla by flashing a few frames of a stop sign for less than half a second on an Internet-connected billboard.

Undocumented Backdoor That Covertly Takes Snapshots Found in Kids' Smartwatch
From ACM TechNews

Undocumented Backdoor That Covertly Takes Snapshots Found in Kids' Smartwatch

Researchers at Norwegian security company Mnemonic found an undocumented backdoor in the X4 smartwatch marketed by children's watch vendor Xplora.

Bringing Power Tool From Math Into Quantum Computing
From ACM TechNews

Bringing Power Tool From Math Into Quantum Computing

Scientists at Japan's Tokyo University of Science designed a novel quantum circuit that calculates the fast Fourier transform faster and more efficiently than previously...

The Contest to Protect Almost Everything on the Internet
From ACM TechNews

The Contest to Protect Almost Everything on the Internet

Hundreds of the world's leading cryptographers are competing to develop encryption standards to protect online data against classical and quantum-computing cyberattacks...

FBI/DHS: Government Systems Face Threat From Zerologon Exploits
From ACM TechNews

FBI/DHS: Government Systems Face Threat From Zerologon Exploits

The U.S. Federal Bureau of Investigation and Department of Homeland Security have detected attackers exploiting a Windows vulnerability against state and local...

In Singapore, Facial Recognition Getting Woven Into Everyday Life
From ACM TechNews

In Singapore, Facial Recognition Getting Woven Into Everyday Life

Singaporeans will be able to access government and other services through a facial recognition feature in its SingPass national identity program.

Can Businesses Keep Up With Cyber Threats?
From ACM TechNews

Can Businesses Keep Up With Cyber Threats?

Market research firm Gartner forecasts cybersecurity spending by companies and governments will grow 9% annually from 2021 to 2024.

Flaws in Top Antivirus Software Could Make Computers More Vulnerable
From ACM TechNews

Flaws in Top Antivirus Software Could Make Computers More Vulnerable

CyberArk researcher Eran Shimony has revealed security vulnerabilities in popular antivirus solutions.

Split-Second 'Phantom' Images Can Fool Tesla's Autopilot
From ACM TechNews

Split-Second 'Phantom' Images Can Fool Tesla's Autopilot

Researchers at Israel's Ben Gurion University of the Negev found they could fool Tesla's Autopilot driver-assistance systems into automatically reacting without...

Tax Agency Watchdog Is Investigating IRS Use of Cellphone Location Data
From ACM TechNews

Tax Agency Watchdog Is Investigating IRS Use of Cellphone Location Data

U.S. Treasury Inspector General for Tax Administration J. Russel George said he will review Internal Revenue Service use of software that enables warrantless surveillance...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account