The Biden administration has been trying to choke off use of hacking tools made by the Israeli firm NSO. It turns out that not every part of the government has...The New York Times From ACM News | April 3, 2023
Participants of the Pwn2Own software exploitation conference hacked technology from automaker Tesla twice at the Zero Day Initiative's Pwn2Own software exploitation...PC Magazine From ACM TechNews | March 29, 2023
Utah's Governor Spencer J. Cox signed a social media bill that could restrict access to applications like TikTok and Instagram by children and adolescents.
The New York Times From ACM TechNews | March 28, 2023
General Bytes reported that over $1.5 million in bitcoin was drained from Internet-accessible wallets via its bitcoin ATMs by hackers that exploited a previously...Ars Technica From ACM TechNews | March 27, 2023
Researchers developed the Near-Ultrasound Inaudible Trojan to show how hackers can exploit the vulnerabilities of smart device microphones and voice assistants...University of Texas at San Antonio From ACM TechNews | March 24, 2023
Researchers in Google's Mandiant division have found state-sponsored hackers in China have been evading common cybersecurity tools and spying on government and...The Wall Street Journal From ACM TechNews | March 22, 2023
Generative AI technology from Synthesia was used to create recent deepfake videos that attempted to spread misinformation and propaganda in Venezuela.
Financial Times From ACM TechNews | March 21, 2023
On International Women’s Day, UNESCO released its latest #HerEducationOurFuture factsheet on gender equality in education, which cites persistent gender inequity...UNESCO From ACM TechNews | March 8, 2023
Researchers at Slovak cybersecurity firm ESET have found the first real-world case of Unified Extensible Firmware Interface malware that can take over a computer's...Ars Technica From ACM TechNews | March 9, 2023