acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Docker Servers Targeted by Kinsing Malware Campaign
From ACM TechNews

Docker Servers Targeted by Kinsing Malware Campaign

Over the past few months, a malware campaign has been scanning the Internet for Docker servers running API ports exposed without a password.

Hacker Group Is Eavesdropping on Corporate Email, FTP Traffic
From ACM TechNews

Hacker Group Is Eavesdropping on Corporate Email, FTP Traffic

The Chinese security firm Qihoo 360 reports that a hacker group has been eavesdropping on corporate networks since at least early December.

Crypto-Mining Botnet Has Been Hijacking MSSQL Servers for Almost Two Years
From ACM TechNews

Crypto-Mining Botnet Has Been Hijacking MSSQL Servers for Almost Two Years

A malware botnet has been launching brute-force attacks against Microsoft SQL databases for nearly two years.

COVID-19 Malware Will Wipe Your PC, Rewrite MBR
From ACM TechNews

COVID-19 Malware Will Wipe Your PC, Rewrite MBR

ZDNet has identified five COVID-19-themed malware strains that can wipe an infected PC's files or rewrite its master boot record (MBR).

Software Release Cycles Accelerate, but Automation Is Not Keeping Up
From ACM TechNews

Software Release Cycles Accelerate, but Automation Is Not Keeping Up

A Cloud Native Computing Foundation survey of 1,337 managers and practitioners found that most software developer outfits are delivering weekly or faster releases...

Bugs in Open Source Software Hit a Record High
From ACM TechNews

Bugs in Open Source Software Hit a Record High

The number of open source software vulnerabilities identified rose from 4,100 last year to 6,100 this year, according to security firm WhiteSource.

Modern RAM Still Vulnerable to Rowhammer Attacks
From ACM TechNews

Modern RAM Still Vulnerable to Rowhammer Attacks

Extensive mitigations deployed during the last six years have failed to eliminate modern random-access memory (RAM) cards' vulnerability to Rowhammer exploits. ...

Hacking Victims Are Uncovering Cyberattacks Faster; GDPR Is the Reason Why
From ACM TechNews

Hacking Victims Are Uncovering Cyberattacks Faster; GDPR Is the Reason Why

GDPR has been linked to quicker cyberattack discovery times in the European Union. 

The Top 10 Software Flaws Used by Crooks
From ACM TechNews

The Top 10 Software Flaws Used by Crooks

Researchers at cybersecurity firm Recorded Future report that eight of the top 10 software flaws most commonly exploited last year were associated with Microsoft...

Australia Focusing on Blockchain Potential with New Roadmap
From ACM TechNews

Australia Focusing on Blockchain Potential with New Roadmap

Australia's government has released a blockchain roadmap outlining a strategy to facilitate job creation, economic growth, more cost-efficient business, and higher...

Microsoft Discloses Security Breach of Customer Support Database
From ACM News

Microsoft Discloses Security Breach of Customer Support Database

Five servers storing customer support analytics were accidentally exposed online in December 2019.

Hundreds of Millions of Cable Modems Vulnerable to Cable Haunt Vulnerability
From ACM TechNews

Hundreds of Millions of Cable Modems Vulnerable to Cable Haunt Vulnerability

Danish researchers reported a security vulnerability affecting cable modems that use Broadcom chips, which is believed to impact about 200 million cable modems...

Chinese Hacker Group Caught Bypassing 2FA
From ACM TechNews

Chinese Hacker Group Caught Bypassing 2FA

Dutch cybersecurity firm Fox-IT said in a report that a hacker group associated with the Chinese government has been bypassing two-factor authentication (2FA) in...

Apple Opens Public Bug Bounty Program, Publishes Rules
From ACM TechNews

Apple Opens Public Bug Bounty Program, Publishes Rules

Apple has formally opened its bug bounty program to all researchers and outlined the program's rules on its website. The maximum available bounty is $1.5 million...

Most Brazilians Believe Companies Don't Protect Their Personal Data
From ACM TechNews

Most Brazilians Believe Companies Don't Protect Their Personal Data

Among the findings of a Harris Poll survey of 11,000 consumers in 11 countries was that nearly all Brazilians feel companies are not adequately protecting their...

Attackers Using WhatsApp MP4 Video Files Vulnerability Can Remotely Execute Code
From ACM TechNews

Attackers Using WhatsApp MP4 Video Files Vulnerability Can Remotely Execute Code

Facebook has reported a vulnerability in WhatsApp messaging software that allows malefactors to conduct denial-of-service or remote code execution attacks.

Mozilla Doubles Payouts as It Tries to Attract Software Vulnerability Hunters
From ACM TechNews

Mozilla Doubles Payouts as It Tries to Attract Software Vulnerability Hunters

Mozilla has increased payouts for its bug bounty program while adding new websites and services to the list in order to draw more interest from bug hunters.

Python Programming Language, AWS Skills Demand Exploding
From ACM TechNews

Python Programming Language, AWS Skills Demand Exploding

Analysis of Indeed.com job search engine listings over the last five years found explosive growth in demand for skills in Python.

Australia Releases Draft IoT Cybersecurity Code of Practice
From ACM TechNews

Australia Releases Draft IoT Cybersecurity Code of Practice

The Australian government has issued a draft code of practice for Internet of Things cybersecurity, with a public consultation to run until March 1, 2020.

World's Fastest Supercomputers Hit Higher Speeds with Linux
From ACM TechNews

World's Fastest Supercomputers Hit Higher Speeds with Linux

The latest Top500 supercomputer ratings found the Oak Ridge National Laboratory's Summit system topping the list with a High-Performance Linpack benchmark of 148...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account