acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


U.K. Government Use of 'General Warrants' to Authorize Computer, Phone Hacking Is Unlawful: Court
From ACM TechNews

U.K. Government Use of 'General Warrants' to Authorize Computer, Phone Hacking Is Unlawful: Court

The U.K.'s High Court has ruled that government security and intelligence services cannot use "general warrants" to indiscriminately hack domestic mobile phones...

Airport Screening While Wearing Masks? Facial Recognition Tech Shows Up to 96% Accuracy in Recent Test
From ACM TechNews

Airport Screening While Wearing Masks? Facial Recognition Tech Shows Up to 96% Accuracy in Recent Test

What was described as a controlled test of facial recognition technologies found potential for accurately identifying individuals on security lines at airports...

Trump Administration Rolls Out Plan to Secure Maritime Sector Against Cyber Threats
From ACM TechNews

Trump Administration Rolls Out Plan to Secure Maritime Sector Against Cyber Threats

The White House has unveiled a plan to protect the U.S. maritime transportation sector against cybersecurity threats.

Nissan Source Code Leaked Online After Git Repo Misconfiguration
From ACM TechNews

Nissan Source Code Leaked Online After Git Repo Misconfiguration

Software engineer Tillie Kottmann said Nissan North America's misconfiguration of a Bitbucket Git server led to the online leakage of the automaker’s source code...

Telegram Feature Exposes Your Precise Address to Hackers
From ACM TechNews

Telegram Feature Exposes Your Precise Address to Hackers

Hackers can exploit the Telegram messenger application employed in Android devices and iPhones to pinpoint users' precise locations.

Malware Uses WiFi BSSID for Victim Identification
From ACM TechNews

Malware Uses WiFi BSSID for Victim Identification

A newly discovered malware strain collects an infected user's Basic Service Set Identifier, in order to ascertain the location of the user and their Wi-Fi access...

Hackers Exploit Backdoor Built Into Zyxel Devices
From ACM TechNews

Hackers Exploit Backdoor Built Into Zyxel Devices

Niels Teusink, a researcher at Netherlands-based security firm Eye Control, found that hackers are attempting to exploit a backdoor built into several Zyxel device...

Digital IDs Make Their Mark
From ACM News

Digital IDs Make Their Mark

Encrypted identification data on a smartcard or smartphone can deliver significant benefits while boosting security, but raise concerns about privacy and the potential...

Microsoft Says Russian Hackers Viewed Some of Its Source Code
From ACM TechNews

Microsoft Says Russian Hackers Viewed Some of Its Source Code

Microsoft on Thursday said the Russian exploit of U.S. government agencies and private corporations extended further into its network than previously thought.

Insecure Wheels: Police Turn to Car Data to Destroy Suspects' Alibis
From ACM TechNews

Insecure Wheels: Police Turn to Car Data to Destroy Suspects' Alibis

Law enforcement agencies increasingly are using data stored in an automobile's onboard computers to solve crimes.

Apple Loses Copyright Battle Against Security Startup Corellium
From ACM TechNews

Apple Loses Copyright Battle Against Security Startup Corellium

Apple's lawsuit against security research firm Corellium has failed, with a federal judge rejecting claims that Corellium's software breached copyright law.

Apple, Google to Stop X-Mode From Collecting Location Data From Users' Phones
From ACM TechNews

Apple, Google to Stop X-Mode From Collecting Location Data From Users' Phones

Apple and Google said they will bar data broker X-Mode Social from culling location information from mobile devices running their operating systems.

How We Can Be Manipulated Into Sharing Private Information Online
From ACM TechNews

How We Can Be Manipulated Into Sharing Private Information Online

Researchers found online users are more likely to expose private information based on the structuring of website forms.

A Better Kind of Cybersecurity Strategy
From ACM TechNews

A Better Kind of Cybersecurity Strategy

Researchers contend Russia's use of North Korean IP addresses for a 2018 cyberattack underscored the need for a new cybersecurity strategy involving selective retaliation...

Farmers Get Their Own Security Advice as Cyberattacks Increase
From ACM TechNews

Farmers Get Their Own Security Advice as Cyberattacks Increase

The U.K.'s National Cyber Security Center has published guidance for farmers to help guard against cyberattacks.

AI, Drones, 4K Cameras: New Tech Boosts Security Systems in Japan
From ACM TechNews

AI, Drones, 4K Cameras: New Tech Boosts Security Systems in Japan

Shortages of security personnel in Japan have prompted adoption of technologies such as artificial intelligence, drones, and 4K video cameras.

Kazakhstan Spies on Citizens' HTTPS Traffic; Browser-Makers Fight Back
From ACM TechNews

Kazakhstan Spies on Citizens' HTTPS Traffic; Browser-Makers Fight Back

Google, Mozilla, Apple, and Microsoft are partnering to stop Kazakhstan'€™s government from decrypting and reading HTTPS-encrypted traffic between citizens and...

iPhones Vulnerable to Hacking Tools for Months, Researchers Say
From ACM TechNews

iPhones Vulnerable to Hacking Tools for Months, Researchers Say

Researchers said spyware sold by Israel's NSO Group incorporated a zero-click zero-day exploit that could commandeer iPhones via a flaw in iMessage.

Microsoft: 2021 is the Year Passwords Die
From ACM News

Microsoft: 2021 is the Year Passwords Die

The software giant has highlighted the strides it made to kill off passwords in 2020, and has stated that it plans to make them a thing of the past for all its...

Fugaku Takes the Lead
From Communications of the ACM

Fugaku Takes the Lead

Japan tops the Top500 supercomputer rankings, for the moment.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account