acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Is Your Mobile Provider Tracking Your Location? This Technology Could Stop It.
From ACM TechNews

Is Your Mobile Provider Tracking Your Location? This Technology Could Stop It.

A new system can thwart the tracking of cellphone users by network operators while maintaining seamless connectivity.

Stanford Researchers Use AI to Unlock Extreme Weather Mysteries
From ACM TechNews

Stanford Researchers Use AI to Unlock Extreme Weather Mysteries

New machine-learning approach helps scientists understand increased frequency of extreme precipitation days in the Midwest

Wildfire Simulation Heats Up
From ACM TechNews

Wildfire Simulation Heats Up

Computer simulations can predict the spread of wildfires through sections of a real forest

Researchers Develop Smart-Car Identity and Access Management System
From ACM TechNews

Researchers Develop Smart-Car Identity and Access Management System

Researchers at City, University of London have developed an identity and access management system to make smart cars less vulnerable to cyber attacks.

Security Company Warns of Mitsubishi Industrial Control Vulnerabilities
From ACM TechNews

Security Company Warns of Mitsubishi Industrial Control Vulnerabilities

Researchers at cybersecurity firm Nozomi Networks Labs have identified five vulnerabilities in Mitsubishi's safety programmable logic controllers, centered on the...

'Glowworm Attack' Recovers Audio From Devices' Power LEDs
From ACM TechNews

'Glowworm Attack' Recovers Audio From Devices' Power LEDs

Israeli scientists have demonstrated a novel passive variant of the TEMPEST exploit called Glowworm, which can extract electronic conversations by analyzing devices'...

U.S. Prisons Mull AI to Analyze Inmate Phone Calls
From ACM TechNews

U.S. Prisons Mull AI to Analyze Inmate Phone Calls

The U.S. House Appropriations Committee has asked for a report on using artificial intelligence to analyze prison inmates' phone calls to help prevent violent crime...

Messaging Apps Have an Eavesdropping Problem
From ACM TechNews

Messaging Apps Have an Eavesdropping Problem

Google's Project Zero researcher Natalie Silvanovich found vulnerabilities in messaging apps that add eavesdropping bugs without requiring users to click a malicious...

Novel ASIC Implements Post-Quantum Cryptography
From ACM TechNews

Novel ASIC Implements Post-Quantum Cryptography

Chip efficiently implements post-quantum cryptography to better protect against future hacker attacks using quantum computers

Security Flaws Found in Popular EV Chargers
From ACM TechNews

Security Flaws Found in Popular EV Chargers

Analysts have identified flaws in the application programming interfaces of six home electric vehicle (EV) charging brands, as well as the Chargepoint public EV...

Apple is Prying into iPhones to Find Sexual Predators
From ACM News

Apple is Prying into iPhones to Find Sexual Predators

Privacy activists worry governments could weaponize the feature.

U.S. Taps Tech Giants to Help Fight Ransomware, Cyberattacks
From ACM News

U.S. Taps Tech Giants to Help Fight Ransomware, Cyberattacks

The Department of Homeland Security enlists Amazon, Microsoft, Google and others to help combat cyberthreats.

Microsoft Warns Over Unusual Malware That Targets Windows, Linux
From ACM TechNews

Microsoft Warns Over Unusual Malware That Targets Windows, Linux

Microsoft security researchers are warning customers about the LemonDuck crypto-mining malware that attacks Windows and Linux systems.

Oregon Examines Spyware Investment amid Controversy
From ACM News

Oregon Examines Spyware Investment amid Controversy

The Oregon state employee pension fund is one of the largest investors, if not the largest, in a private equity firm that has majority ownership of NSO Group, the...

Do You Hear What I Hear? A Cyberattack.
From ACM TechNews

Do You Hear What I Hear? A Cyberattack.

Carnegie Mellon University researchers have designed a method of making abnormal network traffic audible by rendering cybersecurity data musically.

$49 Malware Receives Major Upgrade to Strike Windows, macOS PCs
From ACM TechNews

$49 Malware Receives Major Upgrade to Strike Windows, macOS PCs

Researchers at Check Point Research said the Windows-based malware variant known as Formbook has been upgraded to infiltrate Mac computers.

Cyber Risk in Digital Transformation
From ACM News

Cyber Risk in Digital Transformation

Cybersecurity missteps during corporate Digital Transformation efforts can lead to digital breaches.

EU Fines Amazon Record $888 Million Over Data Violations
From ACM TechNews

EU Fines Amazon Record $888 Million Over Data Violations

Luxembourg's CNPD data protection authority fined Amazon a record $888 million for breaching the EU's General Data Protection Regulation (GDPR).

Honeypot Security Technique Can Stop Attacks in Natural Language Processing
From ACM TechNews

Honeypot Security Technique Can Stop Attacks in Natural Language Processing

A machine learning framework can proactively counter universal trigger attacksi n natural language processing applications.

Cybersecurity Technique Keeps Hackers Guessing
From ACM TechNews

Cybersecurity Technique Keeps Hackers Guessing

Development Command's Army Research Laboratory ]has designed a machine learning-based framework to augment the security of in-vehicle computer networks.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account