Juice jacking requires attackers to tamper with a public USB charging station to load malicious software that would open a device to two-way data transfer.
Security and Privacy
Aerial Solutions for Supporting Large-Scale Events: A Case Study of the Hajj Pilgrimage
NTFPs offer high-altitude deployment, wide coverage, and robust backhaul capacity.
Combating Misinformation in the Arab World: Challenges and Opportunities
Examining methods for combating misinformation in the Arab world.
As Good as a Coin Toss: Human Detection of AI-Generated Content
There's a critical need for alternative countermeasures to more effectively combat the potential and realized harms arising from synthetic media misuse.
Fifty Years of Open Source Software Supply-Chain Security
Problems with software supply-chain security are fundamental and have no easy answers.
Strengthening Enterprise Quantum Security
The clock isn’t ready to strike midnight on outdated encryption, but it’s ticking louder every day.
Cybersecurity in The Arab World: Technological and Socio-Political Dimensions
A cooperative strategy could position the Arab World as an influential contributor to global cybersecurity and AI development.
The Pros and Cons of Zero Trust
Implementations are complex, resource-intensive, and involve high costs.
Illusions provide a way to study compositional generation and understand how machine learning models generate images.
AI is the ultimate force multiplier for cybercriminals, making scams cheaper, faster, and more convincing.
Spotting Scams Based on Fake Profiles
A lack of awareness of how scammers operate keeps them just a click away, ready to steal your money, identity, and sensitive information.
Socioeconomic Threats of Deepfakes and the Role of Cyber-Wellness Education in Defense
Malicious actors appear to be a step ahead of policymakers and educational institutions developing cyber-wellness education and enforcement programs.
The Power of Digital Twins in Cybersecurity
The convergence of IT and OT systems has introduced cybersecurity risks where a single weak spot can render an entire network vulnerable.
A historical perspective on tackling new cyber challenges and securing the future of the computing infrastructure.
NeuroRadar: A Neuromorphic Radar Sensor for Low-Power IoT Systems
NeuroRadar provides a unique and innovative solution for radar sensing in energy-constrained IoT devices.
AI and the Democratization of Cybercrime
Offensive AI should be regulated like a controlled substance.
Deconstructing the Take It Down Act
It is easy to imagine the FTC weaponizing its newfound Take It Down Act authority as a tool of censorship and extortion.
Stop Using Vulnerability Counts to Measure Software Security
A project with a history of vulnerability fixes doesn't mean it is less secure.
SRAM Has No Chill: Exploiting Power Domain Separation to Steal On-Chip Secrets
Showing the effectiveness of a voltage-based attack that snapshots SRAM, without exposing an SoC to low temperature.
Technical Perspective: Defending Data from SRAM-Based Attacks
SRAM-based attacks include recovering portions of memory from internal caches, internal RAM, and some CPU registers; attaching voltage probes that can keep SRAM powered on SoCs.
Internal Chat Logs of Ransomware Group Leaked
Security Principles for Designing an Unhackable Crypto Wallet
Resilience requires formal rigor, verification tools, and zero-trust assumptions.
Two Types of Data Privacy Controls
Precise, sensible, and easy to use terms to differentiate the two intrinsic types of privacy controls will positively impact the accuracy of privacy research and discussions.
Balancing Secrecy and Transparency in Bug Bounty Programs
Embracing transparency while balancing temporary secrecy can lead to a more resilient and accountable software ecosystem.
Shape the Future of Computing
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedCommunications of the ACM (CACM) is now a fully Open Access publication.
By opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More