Homomorphic Technologies Could Process Still-Encrypted Data
Fully homomorphic encryption could stave off the security threats quantum computers pose to current encryption techniques.
Homomorphic Technologies Could Process Still-Encrypted Data
Fully homomorphic encryption could stave off the security threats quantum computers pose to current encryption techniques.
Deleting X: Why SIGDOC Left the Platform
The platform does not embrace communication design, privacy, and trust, the group's members say.
Is AI Security Work Best Done In Academia or Industry? Part 2
Academia benefits from the flow of fresh talent, a pristine stream that is seemingly magically, continually replenished.
Malicious AI Models Undermine Software Supply-Chain Security
Trusted repositories, cryptographic validation, and controlled access can help organizations mitigate risks associated with malicious AI models.
A Growing Concern in Cybersecurity
A proactive, continuous approach to cybersecurity is key to protecting systems from the evolving threat of zero-day exploits.
Is AI Security Work Best Done In Academia or Industry? Part 1
Many groundbreaking advances in AI research are coming from industry; the source for AI security advances is less clear.
Unlocking Offensive Security to Stay Ahead of Cyber Threats
Actively identifying and eliminating vulnerabilities by thinking like an attacker has become essential.
Judicial website blocking has several desirable properties in fighting online criminal activities, and could be used safely and effectively in the U.S.
Ransomware: Extortion Is My Business
A look at ransomware, its ecosystems, the impact of its attacks, and the tactics of its attackers.
The Rise of Adaptive Phishing: When AI Learns to Manipulate
Tailored phishing messages that appeal directly to the target's interests or match the tone of a trusted contact are harder to spot than traditional phishing.
AI is being used to open, and close, vulnerable points in production systems.
Experts tracked hacked funds across 12 different blockchains, while law enforcement agencies globally coordinated the efforts.
Privacy Washing through PETs: the Case of Worldcoin
The computing community should prevent the use of PETs (privacy enhancing technologies) for privacy washing.
Security Research Gaps Leave Critical Infrastructure Open to Cyberattack
The risk of attack on industrial controls is greater for today's interconnected systems than for those in the isolated world of Stuxnet.
Web 3.0 Requires Data Integrity
It’s time for new integrity-focused standards to enable the trusted AI services of tomorrow.
Cyber Trust Mark to Distinguish Secure Smart Home Devices
The U.S. Cyber Trust Mark program is a mechanism for providers of wireless smart home devices to test and certify the security of their products.
Beyond Compliance: Security Documentation as a Strategic Asset
It’s time to stop viewing security documentation as a necessary evil and start leveraging it as a strategic asset.
Researchers are tuning in on ways to turn down the volume with fabrics and materials that buffer, baffle, and block sound waves.
Willow and the Countdown to Quantum Breaches
The ever-increasing speed of quantum computers bodes both well and poorly for cybersecurity.
Why Policies and Training Fail Without a Strong Cybersecurity Culture
Organizations must foster a culture of trust where employees feel comfortable discussing security concerns openly.
Reasons to Raise the Cyber-Shields
Exploiting Cross-Layer Vulnerabilities: Off-Path Attacks on the TCP/IP Protocol Suite
An investigation of vulnerabilities within the TCP/IP protocol suite that can be exploited by forged ICMP errors.
A Glimpse Into the Pandora’s Box
A combination of safety measures and safety labels should be developed and employed on how AI models in applications analyze camera frames in real time.
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedBy opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More