acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Huawei Suspended From Global Forum Aimed at Combating Cybersecurity Breaches
From ACM TechNews

Huawei Suspended From Global Forum Aimed at Combating Cybersecurity Breaches

Huawei Technologies' membership in the Forum of Incident Response and Security Teams has been suspended.

Hackers Say They Took Over Vote Scanners Like Those Coming to Georgia
From ACM TechNews

Hackers Say They Took Over Vote Scanners Like Those Coming to Georgia

A report from the DEF CON Voting Machine Hacking Village conference described the discovery of a hack for commandeering ballot-scanning machines similar to those...

Decoding How Kids Get Into Hacking
From ACM TechNews

Decoding How Kids Get Into Hacking

Michigan State University's Thomas Holt identified characteristics and gender-specific behavioral patterns that could inspire children to become hackers.

Map Shows All the Code Connections Between Russia's Hacker Groups
From ACM TechNews

Map Shows All the Code Connections Between Russia's Hacker Groups

Israeli cybersecurity firms Check Point and Intezer have charted Russian hackers' toolkits from wide-ranging analysis of 2,500 malware samples.

Australia Using Technology to Catch Drivers on Phones
From ACM TechNews

Australia Using Technology to Catch Drivers on Phones

The Australian state of New South Wales will be the first jurisdiction in the world to use cameras to catch distracted drivers on their smartphones.

The CS Teacher Shortage
From Communications of the ACM

The CS Teacher Shortage

How can we fill more computer science classrooms when there just aren't enough teachers to go around?

Protecting Industrial Control Systems
From Communications of the ACM

Protecting Industrial Control Systems

Finding, and plugging, the security holes in SCADA.

Closing In on Quantum Error Correction
From Communications of the ACM

Closing In on Quantum Error Correction

Quantum computers will only become practical when they implement quantum error correction.

A Robot with a Firm Yet Gentle Grasp
From ACM TechNews

A Robot with a Firm Yet Gentle Grasp

A new dynamic gripper mimics the adjustable grip of the human hand, a breakthrough that could improve industrial safety.

Criminologist Builds Computer Model for More Efficient Police Patrols
From ACM TechNews

Criminologist Builds Computer Model for More Efficient Police Patrols

Analysis by University of Texas at Dallas assistant professor of criminology Andrew Wheeler yielded a computer model to guide the Carrollton, TX, police department...

Fending Off Digital Sabotage
From ACM News

Fending Off Digital Sabotage

Sabotage-resistant industrial machinery combats Stuxnet-like attacks.

World Catching Up With China on Surveillance Tech
From ACM TechNews

World Catching Up With China on Surveillance Tech

China is the global leader in surveillance technologies, although other countries are catching up, according to a study by the Carnegie Endowment for International...

Google Unveils DNS-over-HTTPS (DoH) Plan, Mozilla's Faces Criticism
From ACM News

Google Unveils DNS-over-HTTPS (DoH) Plan, Mozilla's Faces Criticism

DNS-over-HTTPS allows DNS resolution to be conducted over encrypted HTTPS connections rather than through the normal plain text DNS lookups.

Report Reveals Growing Threat of Cyberattacks to Food Safety
From ACM TechNews

Report Reveals Growing Threat of Cyberattacks to Food Safety

Cyberattacks pose a rising threat to food production and safety, according to researchers at the University of Minnesota's Food Protection and Defense Institute...

How Hackers Could Break Into the Smart City
From ACM TechNews

How Hackers Could Break Into the Smart City

The more connected a smart city is, the greater its vulnerability to cyberattack.

Algorithm Can Distinguish Cyberbullies from Normal Twitter Users with 90% Accuracy
From ACM TechNews

Algorithm Can Distinguish Cyberbullies from Normal Twitter Users with 90% Accuracy

Machine learning algorithms developed by a team of Binghamton University researchers can differentiate bullies and aggressors on Twitter from normal users with...

Website Rates Security of Internet-Connected Devices
From ACM TechNews

Website Rates Security of Internet-Connected Devices

The site, https://yourthings.info, features rankings of 45 devices on their security capabilities.

Hacking the Smart Home via the Internet of Things
From ACM News

Hacking the Smart Home via the Internet of Things

A group of researchers uncovered implementation flaws in Internet of Things devices.

Intel Server-Grade CPUs Impacted by New NetCAT Attack
From ACM TechNews

Intel Server-Grade CPUs Impacted by New NetCAT Attack

Researchers have described a new exploit targeting Intel central processing units that support Data-Direct I/O Technology and Remote Direct Memory Access features...

How State Election Officials Are Contributing to Weak Security in 2020
From ACM TechNews

How State Election Officials Are Contributing to Weak Security in 2020

A study by cybersecurity company NormShield found U.S. state election offices are failing to implement digital safeguards, increasing the 2020 elections' susceptibility...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account