The wireless carrier said that it was working with the F.B.I. and the Secret Service to investigate a recent wave of fraudulent messages, but said the source did...The New York Times From ACM News | March 31, 2022
University of Georgia researchers unveiled a sensor system that watches power electronic converters at solar energy farms for signs of cyberattack in real time....UGA Today From ACM TechNews | March 30, 2022
A proof-of-concept "browser in the browser" exploit could phish passwords using a malicious site that does not contain suspicious domains or substitute letters....Ars Technica From ACM TechNews | March 29, 2022
The biggest hack since Russia's war began knocked thousands of people offline. The spillover extends deep into Europe.
Wired From ACM News | March 28, 2022
ELTA has released multiple updates on the situation after reporting on Monday that it was struggling to deal with a ransomware attack they discovered on Sunday...The Record From ACM News | March 28, 2022
A programmer behind the popular open-source npm program node-ipc poisoned it with malware that erased the hard drives of computers located in Russia or Belarus....ZDNet From ACM News | March 28, 2022
The EU targets tech giants' walled gardens with aggressive new rules, but the smaller companies the DMA is meant to help are skeptical it will work.
Wired From ACM News | March 28, 2022
The regulation has been years in the making and is set to usher in a radically different ex ante regime for the most powerful tech platforms
TechCrunch From ACM News | March 25, 2022
The European Union was expected to finalize the Digital Markets Act, the most sweeping legislation to regulate tech since a European privacy law was passed in 2018...The New York Times From ACM News | March 24, 2022
Autonomous driving engineers are developing driverless trucks for long-haul freight that runs along simple interstate routes.
Bloomberg Quint From ACM TechNews | March 24, 2022
It may have found a new standard for penalizing tech companies that violate privacy and use deceptive data practices: algorithmic destruction.
Protocol From ACM News | March 23, 2022
At the recent American Indian Science and Engineering Society, students in a workshop created metadata to train an algorithm to understand an image's cultural significance...The New York Times From ACM TechNews | March 23, 2022
Leading technologists and thinkers are concerned about technology's impact on our ethical thinking.
Logan Kugler From Communications of the ACM | April 1, 2022
Members of the hacker gang may act in Russia's interest, but their links to the FSB and Cozy Bear hackers appear ad hoc.
Wired From ACM News | March 18, 2022
To try to halt the war in Ukraine, the U.S. and its allies have imposed the most sweeping export controls seen in decades on Russia. Now they have to enforce them...The New York Times From ACM News | March 17, 2022