acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Cyber Threat to Disrupt Start of U.K. University Term
From ACM TechNews

Cyber Threat to Disrupt Start of U.K. University Term

The U.K.'s National Cyber Security Center is warning colleges and universities that increasing numbers of cyberattacks threaten to disrupt the start of the Fall...

Bouncing Balls and Quantum Computing
From Communications of the ACM

Bouncing Balls and Quantum Computing

A lighthearted method for calculating π is analogous to a fundamental algorithm for quantum computing.

Thwarting Side-Channel Attacks
From Communications of the ACM

Thwarting Side-Channel Attacks

Deep learning challenges chip security.

Who Has Access to Your Smartphone Data?
From Communications of the ACM

Who Has Access to Your Smartphone Data?

ISPs, app developers, and even the government may know more about you than you think.

Fran Allen
From Communications of the ACM

Fran Allen: 1932-2020

Frances E. Allen was the first woman recipient of the ACM A.M. Turing Award.

CISA: Chinese State Hackers Are Exploiting F5, Citrix, Pulse Secure, Exchange Bugs
From ACM TechNews

CISA: Chinese State Hackers Are Exploiting F5, Citrix, Pulse Secure, Exchange Bugs

An advisory from the Cybersecurity and Infrastructure Security Agency (CISA) warns of attacks against U.S. federal networks by hacker groups associated with China's...

Bulletproofing RISC-V Cores
From ACM News

Bulletproofing RISC-V Cores

The RISC-V open standard instruction-set architecture can improve cybersecurity.

Woman Becomes First Healthcare Cyberattack Death
From ACM TechNews

Woman Becomes First Healthcare Cyberattack Death

A woman in Germany suffering a life-threatening illness was the first person to die from a cyberattack on a healthcare system.

The Phish Scale: NIST-Developed Method Helps IT Staff See Why Users Click on Fraudulent Emails
From ACM TechNews

The Phish Scale: NIST-Developed Method Helps IT Staff See Why Users Click on Fraudulent Emails

The Phish Scale could help organizations better train their employees to avoid being deceived by seemingly trustworthy emails.

Most Cybersecurity Reports Only Focus on the Cool Threats
From ACM TechNews

Most Cybersecurity Reports Only Focus on the Cool Threats

A study found just 82 of 629 commercial cybersecurity reports published in the last decade discuss threats to civil society, with the rest devoted to cybercrime...

Millions of WordPress Sites Are Being Probed, Attacked With Recent Plugin Bug
From ACM TechNews

Millions of WordPress Sites Are Being Probed, Attacked With Recent Plugin Bug

Defiant Inc. reports millions of WordPress sites have been attacked by hackers exploiting a zero-day vulnerability in the "File Manager" WordPress plugin.

Malware Gang Uses .NET Library to Generate Excel Docs That Bypass Security Checks
From ACM TechNews

Malware Gang Uses .NET Library to Generate Excel Docs That Bypass Security Checks

Security researchers at NVISO Labs discovered a malware gang is using a .NET library to create malicious Excel files.

Privacy, Blockchain, and IoT--Can We Keep Control of Our Own Identities?
From ACM TechNews

Privacy, Blockchain, and IoT--Can We Keep Control of Our Own Identities?

Research has found privacy issues innate to current blockchain platforms, suggesting the technology requires further refinement for consideration of privacy rights...

With Election Cybersecurity Experts in Short Supply, Some States Call In the National Guard
From ACM TechNews

With Election Cybersecurity Experts in Short Supply, Some States Call In the National Guard

Some U.S. states are asking the National Guard to dispatch cybersecurity experts to fortify their voting systems ahead of the general election in November.

China Launches Initiative to Set Global Data Security Rules
From ACM TechNews

China Launches Initiative to Set Global Data Security Rules

China this week launched the Global Initiative on Data Security, in a bid to establish international data-security standards.

Portland Adopts Landmark Facial Recognition Ordinances
From ACM TechNews

Portland Adopts Landmark Facial Recognition Ordinances

The City Council of Portland, OR, on Wednesday adopted two landmark ordinances barring city and private usage of facial recognition technology.

Kids' Smartwatches a Security Nightmare, Despite Years of Warnings
From ACM TechNews

Kids' Smartwatches a Security Nightmare, Despite Years of Warnings

Researchers at Germany's Münster University of Applied Sciences found smartwatch brands marketed for children are exploitable, based on years of similar findings...

Helping Companies Prioritize Their Cybersecurity Investments
From ACM TechNews

Helping Companies Prioritize Their Cybersecurity Investments

A platform developed by researchers at the Massachusetts Institute of Technology can quantify security risks for companies without requiring them to disclose sensitive...

Computers Can't Cut Red Tape
From ACM News

Computers Can't Cut Red Tape

Modernizing government technology can be helpful during a crisis. To a point.

26-Year-Old is First Woman to Win Africa Prize for Innovation
From ACM TechNews

26-Year-Old is First Woman to Win Africa Prize for Innovation

BACE Group CEO Charlette N'Guessan, 26, is the first woman named to receive the 2020 Royal Academy of Engineering's Africa Prize for Engineering Innovation.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account