acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Record Set for Cryptographic Challenge
From ACM TechNews

Record Set for Cryptographic Challenge

A team of computer scientists in France and the U.S. has set a record for integer factorization, a major challenge in the security of most public key cryptography...

Panel Outlines Massive Federal Cybersecurity Overhaul
From ACM TechNews

Panel Outlines Massive Federal Cybersecurity Overhaul

The Congressional Cyberspace Solarium Commission report on the state of cybersecurity in the U.S. included sweeping recommendations for shoring up cyberdefense....

Facebook, Twitter Suspend Russian-Linked Operation Targeting African Americans on Social Media
From ACM TechNews

Facebook, Twitter Suspend Russian-Linked Operation Targeting African Americans on Social Media

Facebook and Twitter suspended a Russian-linked campaign designed to inflame racial tensions among African Americans in the U.S.

How Secure Are Four, Six-Digit Mobile Phone PINs?
From ACM TechNews

How Secure Are Four, Six-Digit Mobile Phone PINs?

Information technology security experts assessing personal identification numbers codes for securing smartphones found six-digit PINs offer little more security...

Modern RAM Still Vulnerable to Rowhammer Attacks
From ACM TechNews

Modern RAM Still Vulnerable to Rowhammer Attacks

Extensive mitigations deployed during the last six years have failed to eliminate modern random-access memory (RAM) cards' vulnerability to Rowhammer exploits. ...

China Tech Groups Censored Information About Coronavirus
From ACM TechNews

China Tech Groups Censored Information About Coronavirus

Researchers said Chinese social media platforms censored keywords related to the coronavirus outbreak as early as December, potentially limiting the Chinese public's...

The Cybersecurity 202: Cyber Solarium Commission Aims to Avert a Cyber 9/11 Before it’s Too Late
From ACM News

The Cybersecurity 202: Cyber Solarium Commission Aims to Avert a Cyber 9/11 Before it’s Too Late

The group's goal is to make recommendations like those from the 9/11 Commission Report, but before a major disaster in which an adversary could undermine parts...

Intel SGX is Vulnerable to an Unfixable Flaw That Can Steal Crypto Keys and More
From ACM TechNews

Intel SGX is Vulnerable to an Unfixable Flaw That Can Steal Crypto Keys and More

A team of international researchers disclosed a previously undiscovered vulnerability that steals information from Intel's Software Guard eXtensions.

How Wikipedia’s Volunteers Became the Web’s Best Weapon against Misinformation
From ACM News

How Wikipedia’s Volunteers Became the Web’s Best Weapon against Misinformation

In the Facebook era, the volunteer editors behind the archaic-looking website have built Wikipedia into a formidable force for truth.

Driverless Cars Face Laser Sabotage
From ACM News

Driverless Cars Face Laser Sabotage

Attacks on the light-based radar (LiDAR) of autonomous vehicles could drive them off the road, or freeze them in their (tire) tracks.

Hackers Can Clone Millions of Toyota, Hyundai, Kia Keys
From ACM TechNews

Hackers Can Clone Millions of Toyota, Hyundai, Kia Keys

Researchers found previously unknown vulnerabilities in encryption systems used by in-vehicle devices that communicate at close range with key fobs to unlock the...

Researchers Identify Cybersecurity Approach to Protect Army Systems
From ACM TechNews

Researchers Identify Cybersecurity Approach to Protect Army Systems

Researchers have developed an approach to protect Army systems from attack in ways that don't require massive amounts of manual intervention.

How the Cloud Has Opened Doors for Hackers
From ACM TechNews

How the Cloud Has Opened Doors for Hackers

Corporate transfers of operations to the cloud have elevated the threat of hacking.

Hacking Victims Are Uncovering Cyberattacks Faster; GDPR Is the Reason Why
From ACM TechNews

Hacking Victims Are Uncovering Cyberattacks Faster; GDPR Is the Reason Why

GDPR has been linked to quicker cyberattack discovery times in the European Union. 

This App Lets You See IoT Devices Around You and What Data They're Taking
From ACM TechNews

This App Lets You See IoT Devices Around You and What Data They're Taking

Researchers have developed an app that will let users know what IoT technologies are operating in the immediate vicinity and what data they are collecting. 

Flaw in Billions of Wi-Fi Devices Left Communications Open to Eavesdropping
From ACM TechNews

Flaw in Billions of Wi-Fi Devices Left Communications Open to Eavesdropping

Researchers at Slovakian Internet security company ESET discovered that billions of devices are affected by a Wi-Fi vulnerability that allows nearby attackers to...

In Coronavirus Fight, China Gives Citizens a Color Code, with Red Flags
From ACM TechNews

In Coronavirus Fight, China Gives Citizens a Color Code, with Red Flags

To manage the coronavirus epidemic, China is requiring citizens to use software on their smartphones.

'Surfing Attack' Hacks Siri, Google with Ultrasonic Waves
From ACM TechNews

'Surfing Attack' Hacks Siri, Google with Ultrasonic Waves

A multi-institutional collaboration has demonstrated a "surfing attack" that uses ultrasonic waves to hijack voice-recognition systems on cellphones, including...

Hackers Can Trick a Tesla into Accelerating By 50 Miles Per Hour
From ACM TechNews

Hackers Can Trick a Tesla into Accelerating By 50 Miles Per Hour

Researchers at McAfee have demonstrated that adversarial machine learning can thwart autonomous driving systems.

Sandboxing Approach Increases Browser Security
From ACM TechNews

Sandboxing Approach Increases Browser Security

A new Web browser security scheme accelerates Web apps that run within a browser, while keeping those apps within "secure sandboxes" to prevent hijacking by malware...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account