acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
dateMore Than a Year Ago
subjectSecurity
authorDavid Geer
Commissioned by CACM Staff
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Fending off Cyberattacks on Collaborative Robots
From ACM News

Fending off Cyberattacks on Collaborative Robots

Hackers leverage IoT, IIoT vulnerabilities to gain unauthorized access to cobots.

NIST Post-Quantum Cryptography Candidate Cracked
From ACM News

NIST Post-Quantum Cryptography Candidate Cracked

It took researchers in Belgium just an hour to crack the SIKE cryptographic algorithm.

Samsung Breach Slams Consumers
From ACM News

Samsung Breach Slams Consumers

Including this writer.

Software Insecurity
From ACM News

Software Insecurity

Software is more vulnerable than we think.

Raising the Ramparts
From ACM News

Raising the Ramparts

Why the enterprise needs military-grade cybersecurity, too.

Cybercriminals Eye Biometrics
From ACM News

Cybercriminals Eye Biometrics

Biometric markers are increasingly popular targets of data theft, potentially endangering far more than your locally stored information.

Anticipating the War's Direction
From ACM News

Anticipating the War's Direction

Is the U.S. at risk of Russian cyberattacks related to Ukraine?

BlackByte Ransomware Bites Critical Infrastructure, the San Francisco 49ers
From ACM News

BlackByte Ransomware Bites Critical Infrastructure, the San Francisco 49ers

One ransomware attack struck a professional football team as competitors were preparing for the Super Bowl.

A Source of Security Challenges for Years to Come
From ACM News

A Source of Security Challenges for Years to Come

Cybersecurity experts agree the recently uncovered Log4Shell software vulnerability is the most dangerous on record.

Active Defenders
From ACM News

Active Defenders

How the new self-healing cybersecurity software works.

Cyber Risk in Digital Transformation
From ACM News

Cyber Risk in Digital Transformation

Cybersecurity missteps during corporate Digital Transformation efforts can lead to digital breaches.

Are We Engaged in a Cyber-war?
From ACM News

Are We Engaged in a Cyber-war?

Here are the reasons why we're not.

Keeping Control of the Wheel
From ACM News

Keeping Control of the Wheel

Developments in automotive cybersecurity.

Is 5G Opening Security Holes in the Internet of Things?
From ACM News

Is 5G Opening Security Holes in the Internet of Things?

The new 5G networks increase hacker access to the Internet of Things.

Cyber-Securing the Home Office
From ACM News

Cyber-Securing the Home Office

Patching the security holes that arise when working from home.

Avoiding Coronavirus Infections to the Email
From ACM News

Avoiding Coronavirus Infections to the Email

Cybercriminals go phishing with COVID lures.

Tracking the Hackers
From ACM News

Tracking the Hackers

Dissecting the SolarWinds hack.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account