acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Cyberattackers Now Quietly Selling Off Their Victim's Internet Bandwidth
From ACM TechNews

Cyberattackers Now Quietly Selling Off Their Victim's Internet Bandwidth

Hackers and malware developers are now targeting victims' Internet connections to produce illicit income clandestinely via proxyware infections, according to researchers...

Ethereum Weathers Bug That Underlines Possible Blockchain Risks
From ACM TechNews

Ethereum Weathers Bug That Underlines Possible Blockchain Risks

Ethereum co-founder Joseph Lubin said the blockchain survived a flaw from outdated software that divided the digital ledger last week, thanks to a quick program...

Popular Smart Home Security System Can Be Remotely Disarmed
From ACM TechNews

Popular Smart Home Security System Can Be Remotely Disarmed

Researchers at cybersecurity company Rapid7 found vulnerabilities that can be used to remotely disarm the Fortress S03 smart home security system.

Biden Administration Establishes Program to Recruit Tech Professionals to Serve in Government
From ACM TechNews

Biden Administration Establishes Program to Recruit Tech Professionals to Serve in Government

The Biden administration has established the U.S. Digital Corps to enlist and train technology professionals to serve in digital positions within the federal government...

Student-Athletes Required to Wear COVID Trackers at Washington State High School
From ACM TechNews

Student-Athletes Required to Wear COVID Trackers at Washington State High School

Some student-athletes and coaches at Eatonville High School in Eatonville, WA, are being required to wear proximity monitors to trace potential COVID-19 exposure...

Have You Really Deleted Your Personal Data From Your Device When You Dispose of It?
From ACM TechNews

Have You Really Deleted Your Personal Data From Your Device When You Dispose of It?

Many users leave sensitive personal information on their electronic devices when discarding them, according to scientists at Canada's universities of Guelph and...

How Safe is a Quantum-Safe Virtual Private Network?
From ACM News

How Safe is a Quantum-Safe Virtual Private Network?

Verizon aims to find out by testing the technology, which is geared at enhancing encryption methods using session key exchange security mechanisms, the carrier...

At White House Summit, U.S. Tech Giants Promise To Spend Billions More To Bolster Cybersecurity
From ACM News

At White House Summit, U.S. Tech Giants Promise To Spend Billions More To Bolster Cybersecurity

The tech giants also pledged to step up their efforts to address a dire talent shortage that has hampered efforts to counter hacking.

DARPA Drone Cybersecurity Software Foils Hackers in Demo
From ACM TechNews

DARPA Drone Cybersecurity Software Foils Hackers in Demo

The U.S. Defense Advanced Research Projects Agency says the hackers it invited to try to hack the High-Assurance Cyber Military Systems all failed.

38M Records Were Exposed Online—Including Contact-Tracing Info
From ACM News

38M Records Were Exposed Online—Including Contact-Tracing Info

Misconfigured Power Apps from Microsoft led to more than 1,000 Web apps accessible to anyone who found them.

Policy Groups Ask Apple to Drop Plans to Inspect iMessages, Scan for Abuse Images
From ACM TechNews

Policy Groups Ask Apple to Drop Plans to Inspect iMessages, Scan for Abuse Images

An open letter from more than 90 policy and rights groups worldwide calls on Apple to drop a plan to scan children's messages for nudity and adults' phones for...

Photonic Processors Light the Way
From Communications of the ACM

Photonic Processors Light the Way

Highly efficient light-based processors can overcome the bottlenecks of today's electronics.

Robot Could Operate Docking Station Inside the Gut
From ACM TechNews

Robot Could Operate Docking Station Inside the Gut

A new robotic insulin delivery system can be implanted surgically in the abdomen, and resupplied with insulin via swallowed magnetic capsules.

China Passes One of the World's Strictest Data-Privacy Laws
From ACM TechNews

China Passes One of the World's Strictest Data-Privacy Laws

China's top legislative body has passed a law requiring those handling the personal data of Chinese citizens to minimize data collection and obtain prior consent...

Millions of Web Camera, Baby Monitor Feeds Exposed
From ACM TechNews

Millions of Web Camera, Baby Monitor Feeds Exposed

Researchers have identified a vulnerability in a software development kit affecting more than 83 million smart devices.

Levitation: Classic Magic Trick May Enable Quantum Computing
From ACM News

Levitation: Classic Magic Trick May Enable Quantum Computing

A new project will use the electric field in an accelerator cavity to try to levitate a tiny metallic particle, allowing it to store quantum information.

DHS Eyes CMMC Model
From ACM News

DHS Eyes CMMC Model

DHS is working to determine a strategy for implementing "a means of ensuring a contractor has key cybersecurity and cyber hygiene practices in place as a condition...

Google Can Take Two Months to Remove Malware Apps from App Store
From ACM TechNews

Google Can Take Two Months to Remove Malware Apps from App Store

It takes an average of 77 days from detection for Google to remove apps that may contain malware from the Google Play Store, accoriding to a recent analysis.

 Optical Adversarial Attack Can Change the Meaning of Road Signs
From ACM News

Optical Adversarial Attack Can Change the Meaning of Road Signs

An OPtical ADversarial attack uses structured illumination to alter the appearance of target objects, and requires only a commodity projector, a camera, and a computer...

Blockchain Technology Could Be Set for Major Security Boost
From ACM TechNews

Blockchain Technology Could Be Set for Major Security Boost

A team of researchers has strengthened blockchain networks against potential quantum computing threats through the development of a post-quantum cryptographic layer...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account