acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorWired
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


The Pentagon Is Bolstering Its AI Systems—by Hacking Itself
From ACM News

The Pentagon Is Bolstering Its AI Systems—by Hacking Itself

A new "red team" will try to anticipate and thwart attacks on machine learning programs.

Apple’s M1 Chip Has a Fascinating Flaw
From ACM News

Apple’s M1 Chip Has a Fascinating Flaw

The covert channel bug is harmless, but it demonstrates that even new CPUs have mistakes in them.

As Chips Shrink, Rowhammer Attacks Get Harder to Stop
From ACM News

As Chips Shrink, Rowhammer Attacks Get Harder to Stop

A full fix for the "Half-Double" technique will require rethinking how memory semiconductors are designed.

France Ties Russia's Sandworm to Multiyear Hacking Spree
From ACM TechNews

France Ties Russia's Sandworm to Multiyear Hacking Spree

The French National Agency for the Security of Information Systems said attackers associated with Russian military hackers have been compromising French targets...

Malware Now Targeting Apple's M1 Processor
From ACM TechNews

Malware Now Targeting Apple's M1 Processor

Security researchers have identified malware customized to run on Apple's new M1 processors in the MacBook Pro, MacBook Air, and Mac Mini computers.

Critical Flaws in Millions of IoT Devices May Never Get Fixed
From ACM TechNews

Critical Flaws in Millions of IoT Devices May Never Get Fixed

Internet of Things security firm Forescout uncovered 33 flaws in seven open source TCP/IP stacks that potentially leave millions of IoT devices vulnerable.

Split-Second 'Phantom' Images Can Fool Tesla's Autopilot
From ACM News

Split-Second 'Phantom' Images Can Fool Tesla's Autopilot

Researchers found they could stop a Tesla by flashing a few frames of a stop sign for less than half a second on an Internet-connected billboard.

Split-Second 'Phantom' Images Can Fool Tesla's Autopilot
From ACM TechNews

Split-Second 'Phantom' Images Can Fool Tesla's Autopilot

Researchers at Israel's Ben Gurion University of the Negev found they could fool Tesla's Autopilot driver-assistance systems into automatically reacting without...

The Cyber-Avengers Protecting Hospitals From Ransomware
From ACM TechNews

The Cyber-Avengers Protecting Hospitals From Ransomware

The Cyber Threat Intelligence League aims to protect hospitals and health systems around the world from cyberattacks as they deal with Covid-19 cases.

Kids' Smartwatches a Security Nightmare, Despite Years of Warnings
From ACM TechNews

Kids' Smartwatches a Security Nightmare, Despite Years of Warnings

Researchers at Germany's Münster University of Applied Sciences found smartwatch brands marketed for children are exploitable, based on years of similar findings...

Google Will Delete Your Data by Default—in 18 Months
From ACM News

Google Will Delete Your Data by Default—in 18 Months

Starting Wednesday, the search giant will make a previously opt-in auto-delete feature the norm.

Spies Can Eavesdrop by Watching a Light Bulb's Vibrations
From ACM TechNews

Spies Can Eavesdrop by Watching a Light Bulb's Vibrations

Researchers  have developed a long-distance eavesdropping method that exploits vibrations on the glass surface of a light bulb's interior.

The Confessions of Marcus Hutchins, the Hacker Who Saved the Internet
From ACM News

The Confessions of Marcus Hutchins, the Hacker Who Saved the Internet

At 22, he single-handedly put a stop to the worst cyberattack the world had ever seen. Then he was arrested by the FBI. This is his untold story.

Hackers Can Clone Millions of Toyota, Hyundai, Kia Keys
From ACM TechNews

Hackers Can Clone Millions of Toyota, Hyundai, Kia Keys

Researchers found previously unknown vulnerabilities in encryption systems used by in-vehicle devices that communicate at close range with key fobs to unlock the...

The Secret History of Facial Recognition
From ACM News

The Secret History of Facial Recognition

Sixty years ago, a sharecropper's son invented a technology to identify faces. Then the record of his role all but vanished.

Intel Patching the Patch for the Patch for 'Zombieload' Flaw
From ACM TechNews

Intel Patching the Patch for the Patch for 'Zombieload' Flaw

Intel said it will release yet another patch for a microarchitectural data sampling vulnerability that allows hackers to fool microprocessors into exposing protected...

Hackers Can Mess With Voltages to Steal Intel Chips' Secrets
From ACM News

Hackers Can Mess With Voltages to Steal Intel Chips' Secrets

A new attack called Plundervolt gives attackers access to the sensitive data stored in a processor's secure enclave.

Decades-Old Code Putting Millions of Critical Devices at Risk
From ACM TechNews

Decades-Old Code Putting Millions of Critical Devices at Risk

Recently discovered vulnerabilities in a nearly 20-year-old industry standard network protocol from Interpeak could potentially make millions of devices exploitable...

Map Shows All the Code Connections Between Russia's Hacker Groups
From ACM TechNews

Map Shows All the Code Connections Between Russia's Hacker Groups

Israeli cybersecurity firms Check Point and Intezer have charted Russian hackers' toolkits from wide-ranging analysis of 2,500 malware samples.

Google Wants to Help Tech Companies Know Less About You
From ACM News

Google Wants to Help Tech Companies Know Less About You

By releasing its homegrown differential privacy tool, Google will make it easier for any company to boost its privacy bona fides.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account