Researchers have found vulnerabilities in some solid-state drives that allow hackers to circumvent encryption and access local data without knowing the password...ZDNet From ACM TechNews | November 12, 2018
Researchers discovered a new vulnerability in Intel processors that can allow attackers to leak encrypted data from the internal process of a central processing...ZDNet From ACM TechNews | November 9, 2018
It is now legal in the U.S. for consumers and repair companies to break an electronic device's digital rights management protections in order to to repair it.
ZDNet From ACM TechNews | October 31, 2018
At its core, cyberwarfare refers the use of digital attacks by one country or nation to disrupt the computer systems of another with the aim of create significant...ZDNet From ACM Opinion | September 7, 2018
The director of the Defense Science and Technology Group's Cyber and Electronic Warfare Division recommends a big-science approach to cybersecurity in Australia...ZDNet From ACM TechNews | April 20, 2016