The computational expense of creating three-dimensional images that can be viewed by all is just one factor holding them back…
From ACM NewsSandrine Ceurstemont Commissioned by CACM Staff| June 1, 2023
An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.
Researchers in Germany have developed a new attack that can extract and steal data from encrypted Portable Document Format (PDF) files, sometimes without user...ZDNet From ACM TechNews | October 2, 2019
Researchers have described a new exploit targeting Intel central processing units that support Data-Direct I/O Technology and Remote Direct Memory Access features...ZDNet From ACM TechNews | September 16, 2019
Antivirus maker Avast and the French National Police neutralized the back-end infrastructure of a malware botnet.
ZDNet From ACM TechNews | September 10, 2019
A cybersecurity audit found 21% of 430 U.K. schools had their computers, networks, or servers hacked by students.
ZDNet From ACM TechNews | September 9, 2019
Researchers said Greece's top-level domain registrar has suffered a hacker breach, and identified the state-sponsored "Sea Turtle" hacker group as the perpetrator...ZDNet From ACM TechNews | July 15, 2019
Researchers have discovered vulnerabilities that can be exploited remotely to retrieve sensitive data stored inside Hardware Security Modules .
ZDNet From ACM TechNews | June 18, 2019
Researchers have modified a neural network to create a natural language processing algorithm that generates, as well as detects, convincing fake articles.
ZDNet From ACM TechNews | June 5, 2019
Security researchers have discovered a Linux version of Winnti, a malware used by Chinese government-sponsored hackers.
ZDNet From ACM TechNews | May 22, 2019
Dell laptops and personal computers can be remotely commandeered via a vulnerability in the Dell SupportAssist utility.
ZDNet From ACM TechNews | May 9, 2019
Researchers have developed a technique of using simple two-dimensional images to render wearers invisible to surveillance cameras.
ZDNet From ACM TechNews | April 26, 2019
Researchers have found that developers tend to write code that stores user passwords in an unsafe manner, because that is easier than creating a more secure product...ZDNet From ACM TechNews | March 13, 2019
Cisco has advised enterprise users of its wireless virtual private network and firewall routers to immediately install updates to patch a critical flaw.
ZDNet From ACM TechNews | March 7, 2019
Kaspersky Lab researchers revealed at Mobile World Congress 2019 in Spain that bionic hand prostheses from Moscow-based Motorica are vulnerable to hacking.
ZDNet From ACM TechNews | February 27, 2019
Security researchers attending the Pwn2Own CanSecWest security conference this March in Vancouver, Canada, will be incentivized to hack a Tesla Model 3 car.
ZDNet From ACM TechNews | January 22, 2019
The World Economic Forum has listed large-scale cyberattacks and massive data breaches among the five most probable risks facing the world today.
ZDNet From ACM TechNews | January 18, 2019
Hyundai Motor has developed a system that will allow drivers to unlock and start their vehicles using only their fingerprints.
ZDNet From ACM TechNews | December 20, 2018