Socioeconomic Threats of Deepfakes and the Role of Cyber-Wellness Education in Defense
Malicious actors appear to be a step ahead of policymakers and educational institutions developing cyber-wellness education and enforcement programs.
Socioeconomic Threats of Deepfakes and the Role of Cyber-Wellness Education in Defense
Malicious actors appear to be a step ahead of policymakers and educational institutions developing cyber-wellness education and enforcement programs.
The Power of Digital Twins in Cybersecurity
The convergence of IT and OT systems has introduced cybersecurity risks where a single weak spot can render an entire network vulnerable.
A historical perspective on tackling new cyber challenges and securing the future of the computing infrastructure.
NeuroRadar: A Neuromorphic Radar Sensor for Low-Power IoT Systems
NeuroRadar provides a unique and innovative solution for radar sensing in energy-constrained IoT devices.
AI and the Democratization of Cybercrime
Offensive AI should be regulated like a controlled substance.
Deconstructing the Take It Down Act
It is easy to imagine the FTC weaponizing its newfound Take It Down Act authority as a tool of censorship and extortion.
Stop Using Vulnerability Counts to Measure Software Security
A project with a history of vulnerability fixes doesn't mean it is less secure.
SRAM Has No Chill: Exploiting Power Domain Separation to Steal On-Chip Secrets
Showing the effectiveness of a voltage-based attack that snapshots SRAM, without exposing an SoC to low temperature.
Technical Perspective: Defending Data from SRAM-Based Attacks
SRAM-based attacks include recovering portions of memory from internal caches, internal RAM, and some CPU registers; attaching voltage probes that can keep SRAM powered on SoCs.
Internal Chat Logs of Ransomware Group Leaked
Security Principles for Designing an Unhackable Crypto Wallet
Resilience requires formal rigor, verification tools, and zero-trust assumptions.
Two Types of Data Privacy Controls
Precise, sensible, and easy to use terms to differentiate the two intrinsic types of privacy controls will positively impact the accuracy of privacy research and discussions.
Balancing Secrecy and Transparency in Bug Bounty Programs
Embracing transparency while balancing temporary secrecy can lead to a more resilient and accountable software ecosystem.
AI Empowers Novices to Launch Cyberattacks
AI-powered turnkey tools turn those with little technical expertise into cyber monsters.
Beyond Downtime: Architectural Resilience on Hyperscalers
Essential considerations for building durable systems in the cloud era.
The Real, Significant Threat of Shadow AI
Unsanctioned AI tools are a growing risk for organizations, especially those in highly regulated industries where security, compliance, and data integrity are critical.
Turning Servers Against the Cloud
Attacks targeting internal metadata APIs let systems access information about settings and resources in the cloud, including network addresses and URLs.
Integrity will be the primary security challenge for AI systems of the next decade.
Supply Chain Resilience Is More Important than Ever
Cascading relationships that place vendors, partners, and cloud providers into one another’s ecosystems make resilience an essential element of every node.
Beyond the Checkbox: Upgrading the Right to Opt Out
How to make the right to opt out work for everyone.
Homomorphic Technologies Could Process Still-Encrypted Data
Fully homomorphic encryption could stave off the security threats quantum computers pose to current encryption techniques.
Deleting X: Why SIGDOC Left the Platform
The platform does not embrace communication design, privacy, and trust, the group's members say.
Is AI Security Work Best Done In Academia or Industry? Part 2
Academia benefits from the flow of fresh talent, a pristine stream that is seemingly magically, continually replenished.
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedBy opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More