acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Hackers Drain Bitcoin ATMs of $1.5 Million by Exploiting 0-Day Bug
From ACM TechNews

Hackers Drain Bitcoin ATMs of $1.5 Million by Exploiting 0-Day Bug

General Bytes reported that over $1.5 million in bitcoin was drained from Internet-accessible wallets via its bitcoin ATMs by hackers that exploited a previously...

Metaverse Landlords Are Creating a New Class System
From ACM News

Metaverse Landlords Are Creating a New Class System

Virtual landowners have found a way to put their investments to work, but with unintended consequences.

Researchers Reveal Inaudible Remote Cyber-Attacks on Voice Assistant Devices
From ACM TechNews

Researchers Reveal Inaudible Remote Cyber-Attacks on Voice Assistant Devices

Researchers developed the Near-Ultrasound Inaudible Trojan to show how hackers can exploit the vulnerabilities of smart device microphones and voice assistants...

Wave of Stealthy China Cyberattacks Hits U.S., Private Networks, Google Says
From ACM TechNews

Wave of Stealthy China Cyberattacks Hits U.S., Private Networks, Google Says

Researchers in Google's Mandiant division have found state-sponsored hackers in China have been evading common cybersecurity tools and spying on government and...

Password Mismanagement Still at the Heart of Security Issues
From ACM TechNews

Password Mismanagement Still at the Heart of Security Issues

Government employees in the United States and internationally often reuse passwords for their work and personal accounts, according to researchers at threat intelligence...

Passkeys Unlock a New Era for Authentication
From ACM News

Passkeys Unlock a New Era for Authentication

A potential alternative to passwords.

Making Deepfakes Gets Cheaper and Easier Thanks to A.I.
From ACM News

Making Deepfakes Gets Cheaper and Easier Thanks to A.I.

Meme-makers and misinformation peddlers are embracing artificial intelligence tools to create convincing fake videos on the cheap.

Stealthy UEFI Malware Bypassing Secure Boot Enabled by Unpatchable Windows Flaw
From ACM TechNews

Stealthy UEFI Malware Bypassing Secure Boot Enabled by Unpatchable Windows Flaw

Researchers at Slovak cybersecurity firm ESET have found the first real-world case of Unified Extensible Firmware Interface malware that can take over a computer's...

The FBI Just Admitted It Bought US Location Data
From ACM News

The FBI Just Admitted It Bought US Location Data

Rather than obtaining a warrant, the bureau purchased sensitive data—a controversial practice that privacy advocates say is deeply problematic.

As A.I. Booms, Lawmakers Struggle to Understand the Technology
From ACM News

As A.I. Booms, Lawmakers Struggle to Understand the Technology

Tech innovations are again racing ahead of Washington's ability to regulate them, lawmakers and A.I. experts said.

The Race to Beat Elon Musk to Put Chips in People's Brains
From ACM TechNews

The Race to Beat Elon Musk to Put Chips in People's Brains

Companies like Paradromics and Synchron are competing with Elon Musk's Neuralink to design a brain implant that can communicate with computers.

Quantum Computers That Use 'Cat Qubits' May Make Fewer Errors
From ACM TechNews

Quantum Computers That Use 'Cat Qubits' May Make Fewer Errors

Researchers in France found so-called "cat qubits” (quantum bits) could reduce errors by quantum computers and accelerate the cracking of common encryption algorithms...

New Biden Cybersecurity Strategy Assigns Responsibility to Tech Firms
From ACM News

New Biden Cybersecurity Strategy Assigns Responsibility to Tech Firms

The policy document urges more mandates on the firms that control most of the nation's digital infrastructure, and an expanded government role to disrupt hackers...

White House Pushes for Mandatory Regulations, More Offensive Cyber Action under National Cyber Strategy
From ACM News

White House Pushes for Mandatory Regulations, More Offensive Cyber Action under National Cyber Strategy

The plan touts many of the cybersecurity regulations already handed down for oil and natural gas pipelines, aviation, rail, and water systems, but it notes that...

CISA Director Calls on Tech Companies to Build Security into Products
From ACM News

CISA Director Calls on Tech Companies to Build Security into Products

The strategy is expected to target the common vulnerabilities found in tech vendors' products.

Tesla Pauses Rollout of Driving-Assist Software
From ACM News

Tesla Pauses Rollout of Driving-Assist Software

The Full Self-Driving Beta system is subject to a recall in the U.S. involving 363,000 vehicles.

Fending off Cyberattacks on Collaborative Robots
From ACM News

Fending off Cyberattacks on Collaborative Robots

Hackers leverage IoT, IIoT vulnerabilities to gain unauthorized access to cobots.

How to Create, Release, and Share Generative AI Responsibly
From ACM News

How to Create, Release, and Share Generative AI Responsibly

Companies including OpenAI and TikTok have signed up to a new set of guidelines designed to help them be more transparent around generative AI.

Researchers Find New Bug 'Class' in Apple Devices
From ACM TechNews

Researchers Find New Bug 'Class' in Apple Devices

Researchers at cybersecurity company Trellix say they discovered a new class of privilege escalation vulnerability in Apple devices, rooted in Israeli spyware maker...

These Experts are Racing to Protect AI from Hackers. Time is Running Out
From ACM News

These Experts are Racing to Protect AI from Hackers. Time is Running Out

AI is becoming a key part of our lives. Hacking it could cause chaos, so the race is on to build defenses.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account