Juice jacking requires attackers to tamper with a public USB charging station to load malicious software that would open a device to two-way data transfer.
David Geer
Author Archives
The Pros and Cons of Zero Trust
Implementations are complex, resource-intensive, and involve high costs.
Internal Chat Logs of Ransomware Group Leaked
AI Empowers Novices to Launch Cyberattacks
AI-powered turnkey tools turn those with little technical expertise into cyber monsters.
Turning Servers Against the Cloud
Attacks targeting internal metadata APIs let systems access information about settings and resources in the cloud, including network addresses and URLs.
AI is being used to open, and close, vulnerable points in production systems.
Experts tracked hacked funds across 12 different blockchains, while law enforcement agencies globally coordinated the efforts.
Cyber Trust Mark to Distinguish Secure Smart Home Devices
The U.S. Cyber Trust Mark program is a mechanism for providers of wireless smart home devices to test and certify the security of their products.
Willow and the Countdown to Quantum Breaches
The ever-increasing speed of quantum computers bodes both well and poorly for cybersecurity.
Reasons to Raise the Cyber-Shields
Shape the Future of Computing
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get Involved