Researchers have found that "pre-bunking" is a simple, promising method to prevent misinformation.
Associated Press From ACM TechNews | August 30, 2022
Blockchain analytics firm Elliptic warned criminals are increasingly targeting nonfungible tokens (NFTs).
The Wall Street Journal From ACM TechNews | August 30, 2022
Assuring youngsters they can use websites without giving away their personal information is not child's play.
Gregory Goth Commissioned by CACM Staff From ACM News | August 30, 2022
U.S. election officials and security experts are concerned that conspiracy theories related to the 2020 presidential election could encourage interference with...Associated Press From ACM TechNews | August 29, 2022
On Aug. 25, online password manager LastPass reported the theft of some of its source code and proprietary information.
The Wall Street Journal From ACM TechNews | August 29, 2022
German security researchers determined 5G networks can be hacked, having breached and hijacked live networks in a series of "red teaming" exercises.
IEEE Spectrum From ACM TechNews | August 26, 2022
A federal judge said Cleveland State University violated the Fourth Amendment when it used software to scan a student's bedroom.
The New York Times From ACM News | August 26, 2022
Amazon is expanding its reach into the healthcare and smart home industries through its acquisition of a primary care company and a merger with iRobot.
Associated Press From ACM TechNews | August 25, 2022
It was the first time that an influence operation promoting U.S. interests abroad had been discovered and taken down from the social media platforms.
The New York Times From ACM News | August 25, 2022
A class-action lawsuit against U.S. multinational technology company Oracle claims it tracks and collects personal information on billions of people.
PC Magazine From ACM TechNews | August 24, 2022
A privacy researcherfound the TikTok video application's Web browser can track users' keystrokes.
The New York Times From ACM TechNews | August 22, 2022
Researchers trained an artificial intelligence-powered algorithm to identify individuals based their hand vibrations when holding a smartphone.
New Scientist From ACM TechNews | August 22, 2022
Security researcher Zachary Minneker discovered a flaw in the U.S. Department of Veterans Affairs' VistA records platform and determined that hackers easily can...Wired From ACM TechNews | August 18, 2022
Software developer Stephen Lacy identified a malicious URL in the code of an open source project on GitHub that he found through a Google search.
Bleeping Computer From ACM TechNews | August 16, 2022
Google Project Zero security researcher Ivan Fratric launched a remote code execution attack by exploiting the technology underlying Zoom and other applications...PC Magazine From ACM TechNews | August 15, 2022