acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
dateMore Than a Year Ago
subjectSecurity
authorThe New York Times
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


As Automakers Add Technology to Cars, Software Bugs Follow
From ACM News

As Automakers Add Technology to Cars, Software Bugs Follow

As automakers add technology to cars, software bugs follow.

I.R.S. to End Use of Facial Recognition for Identity Verification
From ACM News

I.R.S. to End Use of Facial Recognition for Identity Verification

After a bipartisan backlash, the agency will transition away from using a service from ID.me.

The New Spy Wars
From ACM News

The New Spy Wars

A tale about Israel, Pegasus, and the world.

U.S. Sends Top Security Official to Help NATO Brace for Russian Cyberattacks
From ACM News

U.S. Sends Top Security Official to Help NATO Brace for Russian Cyberattacks

Intelligence assessments suggest that a Russian invasion of Ukraine would most likely be preceded by cyberattacks on the country.

The Battle for the World's Most Powerful Cyberweapon
From ACM News

The Battle for the World's Most Powerful Cyberweapon

A Times investigation reveals how Israel reaped diplomatic gains from NSO's Pegasus spyware, a tool America itself purchased but is now trying to ban.

How Cookie Banners Backfired
From ACM News

How Cookie Banners Backfired

An extensive digital privacy law aimed to give internet users more control over their data. Instead, experts say, it's created "almost a useless exercise."

It's Hard to Tell When the Crypto Bubble Will Burst, or If There Is One
From ACM News

It's Hard to Tell When the Crypto Bubble Will Burst, or If There Is One

Crypto prices are highly volatile, but die-hard enthusiasts believe prices will keep soaring in a world where traditional notions of value don't apply.

How the Computer Chip Shortage Could Incite a U.S. Conflict With China
From ACM News

How the Computer Chip Shortage Could Incite a U.S. Conflict With China

A war game and study by a think tank illustrate how dependent the world is on Taiwan's semiconductor foundries.

Microsoft Warns of Destructive Cyberattack on Ukrainian Computer Networks
From ACM News

Microsoft Warns of Destructive Cyberattack on Ukrainian Computer Networks

The malware was revealed as Russian troops remained massed at the Ukrainian border, and after Ukrainian government agencies had their websites defaced.

Buying Influence: How China Manipulates Facebook and Twitter
From ACM News

Buying Influence: How China Manipulates Facebook and Twitter

Inside a Chinese propaganda campaign.

Are Apple AirTags Being Used to Track People, Steal Cars?
From ACM TechNews

Are Apple AirTags Being Used to Track People, Steal Cars?

Concerns are mounting as Apple's location-tracking AirTag devices are being found on people's cars and in their belongings, giving rise to fears of stalking.

Navigational Apps for the Blind Could Have a Broader Appeal
From ACM News

Navigational Apps for the Blind Could Have a Broader Appeal

A proliferation of new apps designed to help blind and low vision people could prove useful for everyone.

Banks Tiptoe Toward Their Cloud-Based Future
From ACM News

Banks Tiptoe Toward Their Cloud-Based Future

Cloud computing is slowly changing how Wall Street banks handle their business, but concerns with security remain.

How TikTok Reads Your Mind
From ACM News

How TikTok Reads Your Mind

It's the most successful video app in the world. An internal company document offers a new level of detail about how the algorithm works.

U.S. Military Has Acted Against Ransomware Groups
From ACM News

U.S. Military Has Acted Against Ransomware Groups

The head of Cyber Command said a new cross-functional effort has been gathering intelligence to combat criminal groups targeting U.S. infrastructure.

Those Cute Cats Online? They Help Spread Misinformation.
From ACM News

Those Cute Cats Online? They Help Spread Misinformation.

A mainstay of the Internet is regularly used to build audiences for people and organizations pushing false and misleading information.

Apple Sues Israeli Spyware Maker, Seeking to Block Its Access to iPhones
From ACM News

Apple Sues Israeli Spyware Maker, Seeking to Block Its Access to iPhones

Apple accused NSO Group, the Israeli surveillance company, of "flagrant" violations of its software, as well as federal and state laws.

Meta to Remove Thousands of Sensitive Ad-Targeting Categories
From ACM News

Meta to Remove Thousands of Sensitive Ad-Targeting Categories

Shielding users' interests in topics like race, health, religion, and politics.

Russia Is Censoring the Internet, With Coercion and Black Boxes
From ACM News

Russia Is Censoring the Internet, With Coercion and Black Boxes

A former head of State Department programs on Internet freedom said, "Russia's censorship model can quickly and easily be replicated by other authoritarian governments...

A Rare Win in the Cat-and-Mouse Game of Ransomware
From ACM News

A Rare Win in the Cat-and-Mouse Game of Ransomware

A team of private security sleuths, in their first public detailing of their efforts, discuss how they used cybercriminals' mistakes to quietly help victims recover...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account