acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
datePast Year
subjectSecurity
authorArs Technica
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Used Routers Often Loaded with Corporate Secrets
From ACM TechNews

Used Routers Often Loaded with Corporate Secrets

Scientists from Slovak security firm ESET found that half of the used routers its researchers purchased for testing were loaded with sensitive corporate information...

Hackers Drain Bitcoin ATMs of $1.5 Million by Exploiting 0-Day Bug
From ACM TechNews

Hackers Drain Bitcoin ATMs of $1.5 Million by Exploiting 0-Day Bug

General Bytes reported that over $1.5 million in bitcoin was drained from Internet-accessible wallets via its bitcoin ATMs by hackers that exploited a previously...

Stealthy UEFI Malware Bypassing Secure Boot Enabled by Unpatchable Windows Flaw
From ACM TechNews

Stealthy UEFI Malware Bypassing Secure Boot Enabled by Unpatchable Windows Flaw

Researchers at Slovak cybersecurity firm ESET have found the first real-world case of Unified Extensible Firmware Interface malware that can take over a computer's...

AI-Powered Bing Chat Loses its Mind When Fed Ars Technica Article
From ACM News

AI-Powered Bing Chat Loses its Mind When Fed Ars Technica Article

"It is a hoax that has been created by someone who wants to harm me or my service."

RSA's Demise from Quantum Attacks is Very Much Exaggerated, Expert Says
From ACM News

RSA's Demise from Quantum Attacks is Very Much Exaggerated, Expert Says

Simson Garfinkel says the focus on quantum attacks may distract us from more immediate threats.

A Scientist's Quest for an Accessible, Unhackable Voting Machine
From ACM News

A Scientist's Quest for an Accessible, Unhackable Voting Machine

After 19 years of work, Juan Gilbert says he has invented the most secure voting machine.

Europe Prepares to Rewrite Internet Rules
From ACM TechNews

Europe Prepares to Rewrite Internet Rules

The enactment of the European Union's Digital Markets Act is expected to force big technology platforms to become more transparent and interoperable next year. ...

Deepfake Audio Has a Tell
From ACM TechNews

Deepfake Audio Has a Tell

Researchers at the University of Florida can detect audio deepfakes by measuring acoustic and fluid dynamic distinctions between organic and synthetic voice samples...

Cops Wanted to Keep Mass Surveillance App Secret; Privacy Advocates Refused
From ACM News

Cops Wanted to Keep Mass Surveillance App Secret; Privacy Advocates Refused

Fog Reveal is "almost invisible" when attempting to search for it online.

Organizations Spending Billions on Easy-to-Bypass Malware Defense
From ACM TechNews

Organizations Spending Billions on Easy-to-Bypass Malware Defense

Research suggests that hackers can easily circumvent Endpoint Detection and Response systems, the malware detecting and blocking solutions on which organizations...

Post-Quantum Encryption Contender Taken Out by Single-Core PC in One Hour
From ACM TechNews

Post-Quantum Encryption Contender Taken Out by Single-Core PC in One Hour

Researchers ruled out an algorithm selected by the U.S. National Institute of Standards and Technology as a potential post-quantum encryption program.

YouTube Content Creator Credentials Are Under Siege by YTStealer Malware
From ACM TechNews

YouTube Content Creator Credentials Are Under Siege by YTStealer Malware

A researcher at security firm Intezer identified a new malware that can steal YouTube content creators' authentication credentials.

Tesla Hack Gives Thieves Their Own Personal Key
From ACM TechNews

Tesla Hack Gives Thieves Their Own Personal Key

Austrian security researcher Martin Herfurt has demonstrated that electric vehicle company Tesla's updated near-field communication key card can be hacked.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account