<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
	<channel>
		<title>XRDS: Crossroads, The ACM Magazine for Students</title>
		<link>http://dl.acm.org/citation.cfm?id=3764099</link>
		<description />
		<item>
			<title>XRDS: Crossroads, The ACM Magazine for Students</title>
			<link>http://dl.acm.org/citation.cfm?id=3764099</link>
			<description />
			<pubDate>Sun, 01 Jun 2025 00:00:00 GMT </pubDate>
			<author />
			<guid isPermaLink="false">3764099</guid>
		</item>
		<item>
			<title>Securing Our Future</title>
			<link>http://dl.acm.org/citation.cfm?id=3744688</link>
			<description><![CDATA[Denise Doig<br /><br />]]></description>
			<pubDate>Thu, 21 Aug 2025 00:00:00 GMT </pubDate>
			<author />
			<guid isPermaLink="false">3744688</guid>
		</item>
		<item>
			<title>The Future of Cybersecurity: Emerging Challenges and Innovative Strategies</title>
			<link>http://dl.acm.org/citation.cfm?id=3744689</link>
			<description><![CDATA[Moshe Satt<br /><br />]]></description>
			<pubDate>Thu, 21 Aug 2025 00:00:00 GMT </pubDate>
			<author />
			<guid isPermaLink="false">3744689</guid>
		</item>
		<item>
			<title>How Attacks Have Shaped Digital Defense</title>
			<link>http://dl.acm.org/citation.cfm?id=3744692</link>
			<description><![CDATA[Frank Schotanus<br /><br />]]></description>
			<pubDate>Thu, 21 Aug 2025 00:00:00 GMT </pubDate>
			<author />
			<guid isPermaLink="false">3744692</guid>
		</item>
		<item>
			<title>The Risks of AI Coding Assistants: Novice Programmers Beware</title>
			<link>http://dl.acm.org/citation.cfm?id=3744690</link>
			<description><![CDATA[Matthew Galej<br /><br />]]></description>
			<pubDate>Thu, 21 Aug 2025 00:00:00 GMT </pubDate>
			<author />
			<guid isPermaLink="false">3744690</guid>
		</item>
		<item>
			<title>Challenging the Growth Narrative in and Through HCI</title>
			<link>http://dl.acm.org/citation.cfm?id=3744691</link>
			<description><![CDATA[Vishal Sharma, Asra Sakeen Wani, Rapha&#235;l Mar&#233;e, Christoph Becker, Douglas Schuler, Aparajita Marathe, Neha Kumar, Han Qiao, Rikke Hagensby Jensen, Anupriya Tuli<br /><br />]]></description>
			<pubDate>Thu, 21 Aug 2025 00:00:00 GMT </pubDate>
			<author />
			<guid isPermaLink="false">3744691</guid>
		</item>
		<item>
			<title>AI-Powered Phishing: The Current Landscape and Future Projections</title>
			<link>http://dl.acm.org/citation.cfm?id=3744693</link>
			<description><![CDATA[Daniel Aldam<br /><br />AI-powered phishing attacks have rapidly evolved, utilizing advanced personalization, multi-channel deception, and deepfake technology to surpass human-crafted scams in both scale and effectiveness. This unprecedented chapter of cybercrime has created never-before-seen challenges for security professionals. Individuals and organizations will need to adopt AI-driven security measures to keep ahead of these AI-driven threats.]]></description>
			<pubDate>Thu, 21 Aug 2025 00:00:00 GMT </pubDate>
			<author />
			<guid isPermaLink="false">3744693</guid>
		</item>
		<item>
			<title>Scams at Scale: Unmasking Crypto Fraud and Social Engineering on the Modern Web</title>
			<link>http://dl.acm.org/citation.cfm?id=3744694</link>
			<description><![CDATA[Abisheka Pitumpe, Muhammad Muzammil, Xigao Li, Nick Nikiforakis, Amir Rahmati<br /><br />From legitimate-looking cryptocurrency investment portals to fake celebrity giveaways, scammers are building sophisticated campaigns that exploit users' trust across the web to deprive them of their life savings. In this article, we unpack how some of these campaigns operate at scale and how researchers can systematically detect, track, and stop them.]]></description>
			<pubDate>Thu, 21 Aug 2025 00:00:00 GMT </pubDate>
			<author />
			<guid isPermaLink="false">3744694</guid>
		</item>
		<item>
			<title>Cyber-Physical Security in Healthcare: Vulnerabilities and Emerging Solutions</title>
			<link>http://dl.acm.org/citation.cfm?id=3744696</link>
			<description><![CDATA[Aakar Mutha<br /><br />The integration of connected medical devices has transformed patient care but has introduced significant cybersecurity vulnerabilities. This article examines key risks in Internet of Medical Things (IoMT) systems and explores emerging solutions for safeguarding patient safety in an increasingly connected healthcare environment.]]></description>
			<pubDate>Thu, 21 Aug 2025 00:00:00 GMT </pubDate>
			<author />
			<guid isPermaLink="false">3744696</guid>
		</item>
		<item>
			<title>Deepfake Technology and the Rise of Misinformation</title>
			<link>http://dl.acm.org/citation.cfm?id=3744697</link>
			<description><![CDATA[Vamsi Koneti<br /><br />As the advent of deepfake technology blurs the line between fact and fiction, a sophisticated new threat has been gaining ground in the digital age. How is AI-generated media being weaponized to spread disinformation and influence public perception? And can we still trust what we see online?]]></description>
			<pubDate>Thu, 21 Aug 2025 00:00:00 GMT </pubDate>
			<author />
			<guid isPermaLink="false">3744697</guid>
		</item>
		<item>
			<title>Can You Trust What AI Hears (and Says)?</title>
			<link>http://dl.acm.org/citation.cfm?id=3744698</link>
			<description><![CDATA[Jaechul Roh<br /><br />Audio-first language models are becoming the next frontier for AI vulnerabilities.]]></description>
			<pubDate>Thu, 21 Aug 2025 00:00:00 GMT </pubDate>
			<author />
			<guid isPermaLink="false">3744698</guid>
		</item>
		<item>
			<title>DMAP: A Blockchain-Enhanced Deepfake Verification Framework to Safeguard Individual Privacy and National Security</title>
			<link>http://dl.acm.org/citation.cfm?id=3744699</link>
			<description><![CDATA[Abdul Waheed, Nicholas S. Reese<br /><br />While media can be faked, decentralized authentication can restore trust.]]></description>
			<pubDate>Thu, 21 Aug 2025 00:00:00 GMT </pubDate>
			<author />
			<guid isPermaLink="false">3744699</guid>
		</item>
		<item>
			<title>A City That Thinks---But Doesn't Overthink</title>
			<link>http://dl.acm.org/citation.cfm?id=3744700</link>
			<description><![CDATA[Hummd Damita Alikhan<br /><br />Smart cities expand connectivity---but also vulnerability. Equitable governance and built-in cybersecurity are essential to protecting data, infrastructure, and our civil liberties.]]></description>
			<pubDate>Thu, 21 Aug 2025 00:00:00 GMT </pubDate>
			<author />
			<guid isPermaLink="false">3744700</guid>
		</item>
		<item>
			<title>Systems Security at LSU: SySec Lab, Louisiana State University</title>
			<link>http://dl.acm.org/citation.cfm?id=3744701</link>
			<description><![CDATA[Julia Gersey<br /><br />]]></description>
			<pubDate>Thu, 21 Aug 2025 00:00:00 GMT </pubDate>
			<author />
			<guid isPermaLink="false">3744701</guid>
		</item>
		<item>
			<title>The First Computer Password</title>
			<link>http://dl.acm.org/citation.cfm?id=3744702</link>
			<description><![CDATA[Sophia Navalta<br /><br />]]></description>
			<pubDate>Thu, 21 Aug 2025 00:00:00 GMT </pubDate>
			<author />
			<guid isPermaLink="false">3744702</guid>
		</item>
		<item>
			<title>Keeping Your Digital Life Safe: Building a Simple Password Manager</title>
			<link>http://dl.acm.org/citation.cfm?id=3744703</link>
			<description><![CDATA[Pavithra Sripathanallur Murali<br /><br />]]></description>
			<pubDate>Thu, 21 Aug 2025 00:00:00 GMT </pubDate>
			<author />
			<guid isPermaLink="false">3744703</guid>
		</item>
		<item>
			<title>Mitigating Digital Risks for a Secure Future</title>
			<link>http://dl.acm.org/citation.cfm?id=3744704</link>
			<description><![CDATA[Lynnette Hui Xian Ng<br /><br />]]></description>
			<pubDate>Thu, 21 Aug 2025 00:00:00 GMT </pubDate>
			<author />
			<guid isPermaLink="false">3744704</guid>
		</item>
	</channel>
</rss>
