An Iranian military commander Saturday accused the German electronics giant Siemens with helping U.S. and Israeli teams craft the Stuxnet worm that attacked his...Computerworld From ACM News | April 18, 2011
Laptop computers and other digital devices carried into the U.S. may be seized from travelers without a warrant and sent to a secondary site for forensic inspection...Computerworld From ACM News | April 8, 2011
A cyberwar scenario hypothesized by former U.S. State Department diplomat Christopher Bronk in a report published in the U.S. Air Force's Strategic Studies paints...Computerworld From ACM TechNews | April 7, 2011
As real-time and batch analytics evolve using big data processing engines such as Hadoop, corporations will be able to track our activities, habits, and locations...Computerworld From ACM News | March 25, 2011
Cracking encrypted messages can take a very long time using existing technology. However, researchers warn that quantum computers eventually could make cracking...Computerworld From ACM TechNews | March 24, 2011
Intel researchers are developing computer security technology that stop all zero-day attacks. "We're going to see a quantum jump in the ability of future devices...Computerworld From ACM TechNews | February 1, 2011
The European Union is funding Trustworthy Clouds, a research project aimed at developing a series of technical advances that will increase the security of cloud...Computerworld From ACM TechNews | November 29, 2010
1,000 U.S. scientists are involved in exascale development, but China and Europe have stepped up their investment, IBM warns.Computerworld From ACM News | September 27, 2010
Cybersecurity experts testifying at a recent U.S. House of Representatives subcommittee hearing disagreed about whether the federal government should explore new...Computerworld From ACM TechNews | July 16, 2010
The U.S. Department of Health and Human Services (HHS) today issued the final guidelines that will determine how doctors, hospitals and other medical care facilities...Computerworld From ACM News | July 13, 2010
University of Cambridge researchers recently completed a large study of password-protected Web sites and found that a lack of industry standards harms end-user...Computerworld From ACM TechNews | June 9, 2010
Dartmouth College researchers have found that health care data is as easily accessible on peer-to-peer (P2P) networks now as it was before the enactment of a new...Computerworld From ACM TechNews | May 21, 2010
Technology for providing alerts when information on RFID tags is being accessed and controlling access to private information was on display during the recent CHI...Computerworld From ACM TechNews | April 19, 2010
Recent cyberattacks against Google and other tech firms highlight concerns about adversaries' ability to launch a full-fledged cyberwar against the United States...Computerworld From ACM TechNews | April 7, 2010
The threat from cyberattacks is so severe that it actually threatens the very existence of the United States, says Steven Chabinsky, the deputy assistant director...Computerworld From ACM TechNews | March 29, 2010
Australia's federal government has been given sensitive data from utilities, banks, and other organizations for the Critical Infrastructure Protection Modeling...Computerworld Australia From ACM TechNews | February 12, 2010
A new White House report says the U.S. government needs better information technology (IT) to counter potential terrorist attacks, such as the recent attempt to...Computerworld From ACM TechNews | January 11, 2010
SanDisk Corp. and Verbatim Corp. have joined Kingston Technology Inc. in warning customers about a potential security threat posed by a flaw in the hardware-based...ComputerWorld From ACM News | January 8, 2010