acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Top ­niversities Join to Push 'Public Interest Technology'
From ACM News

Top ­niversities Join to Push 'Public Interest Technology'

As technology becomes increasingly pervasive in American life, universities across the United States have been devising ways to teach students how to grapple with...

NSA Makes Ghidra, a Powerful Cybersecurity Tool, Open Source
From ACM TechNews

NSA Makes Ghidra, a Powerful Cybersecurity Tool, Open Source

The U.S. National Security Agency has chosen to open source the cybersecurity tool Ghidra, a reverse-engineering platform that takes "compiled" software and "decompiles"...

Huawei Suit Against ­.S. Tries to Go Where Russian Firm Failed
From ACM News

Huawei Suit Against ­.S. Tries to Go Where Russian Firm Failed

Huawei Technologies Co., the Chinese telecom giant facing multiple criminal indictments in the U.S., is expanding on a Russian company's failed legal argument to...

Machine Learning Can ­se Tweets to Spot Critical Security Flaws
From ACM News

Machine Learning Can ­se Tweets to Spot Critical Security Flaws

At the endless booths of this week's RSA security trade show in San Francisco, an overflowing industry of vendors will offer any visitor an ad nauseam array of...

Triton Is the World's Most Murderous Malware, and It's Spreading
From ACM News

Triton Is the World's Most Murderous Malware, and It's Spreading

As an experienced cyber first responder, Julian Gutmanis had been called plenty of times before to help companies deal with the fallout from cyberattacks.

Huawei Sues ­.S. Over Equipment Ban, Escalating Legal Clash
From ACM News

Huawei Sues ­.S. Over Equipment Ban, Escalating Legal Clash

Huawei Technologies Co. sued the U.S. government for barring its equipment from certain networks, delivering a legal riposte to American accusations it aids China...

Cisco: Patch Routers Now Against Massive 9.8/10-Severity Security Hole
From ACM TechNews

Cisco: Patch Routers Now Against Massive 9.8/10-Severity Security Hole

Cisco has advised enterprise users of its wireless virtual private network and firewall routers to immediately install updates to patch a critical flaw.

You Won't Need a Car Key Anymore with Hyundai's New 'Digital Key' Technology
From ACM TechNews

You Won't Need a Car Key Anymore with Hyundai's New 'Digital Key' Technology

Hyundai is rolling out a Digital Key with the redesigned 2020 Hyundai Sonata that will allow drivers to unlock and start their vehicles via smartphone.

FBI Head Christopher Wray: We Can't Let Criminals Hide Behind Encryption
From ACM Opinion

FBI Head Christopher Wray: We Can't Let Criminals Hide Behind Encryption

Encryption should have limits. That's the message FBI Director Christopher Wray had for cybersecurity experts Tuesday.

­ber Escapes Criminal Charges for 2018 Self-Driving Death in Arizona
From ACM News

­ber Escapes Criminal Charges for 2018 Self-Driving Death in Arizona

A prosecutor in Arizona has decided not to press charges against Uber in the March 2018 death of Elaine Herzberg. One of Uber's self-driving cars crashed into Herzberg...

Putin Wants His Own Internet
From ACM News

Putin Wants His Own Internet

When anti-government protests erupted on Russia's side of the Caucasus Mountains in October, authorities did something they'd never done before: cut mobile internet...

Immunizing Quantum Computers Against Errors
From ACM TechNews

Immunizing Quantum Computers Against Errors

Researchers used trapped calcium ions to render quantum computers error-proof by generating a periodic oscillatory ionic state that bypasses constraints on measurement...

Most Laptops Vulnerable to Attack via Peripheral Devices, Say Researchers
From ACM TechNews

Most Laptops Vulnerable to Attack via Peripheral Devices, Say Researchers

Researchers have determined that hackers can potentially hijack an unattended computing device in seconds through peripherals like chargers and docking stations...

5G Is Still a Little Magic, a Little Smoke and Mirrors
From ACM News

5G Is Still a Little Magic, a Little Smoke and Mirrors

The scene on the big display in front of me looks like something from Grey's Anatomy.

Quantum Physics Could Protect the Grid From Hackers, Maybe
From ACM News

Quantum Physics Could Protect the Grid From Hackers, Maybe

Cybersecurity experts have sounded the alarm for years: Hackers are ogling the U.S. power grid.

China Is Catching ­p to the ­S on Artificial Intelligence Research
From ACM News

China Is Catching ­p to the ­S on Artificial Intelligence Research

Researchers, companies and countries around the world are racing to explore—and exploit—the possibilities of artificial intelligence technology.

Flaws in 4G, 5G Allow Snooping on Calls, Pinpointing Device Location
From ACM TechNews

Flaws in 4G, 5G Allow Snooping on Calls, Pinpointing Device Location

An academic research team has found security flaws in the 4G and 5G cellular networks that can be exploited to spy on phone calls and localize mobile devices.

How Will We Prevent AI-Based Forgery?
From ACM News

How Will We Prevent AI-Based Forgery?

Artificial intelligence-based forgery has reached a watershed moment.

Security Technology Detects Cyberattacks on Drones, Cars, Robots
From ACM TechNews

Security Technology Detects Cyberattacks on Drones, Cars, Robots

Researchers at Mitsubishi Electric have developed sensor-security technology for detecting inconsistencies in sensor measurements when a system is under attack....

Huawei Goes on Offense in the Battle for Hearts and Minds
From ACM News

Huawei Goes on Offense in the Battle for Hearts and Minds

Huawei Technologies Co. has turned to a blend of wit, sarcasm and defiance to publicly fight allegations that the world's largest maker of telecommunications equipment...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account