Two major cloud computing services, Amazon's Elastic Compute Cloud and Sony's PlayStation Network, recently suffered extended outages. Though the circumstances...Technology Review From ACM News | May 4, 2011
University of California, San Diego researchers working on the GreenDroid project have developed software that scans the Android operating system and its most popular...Technology Review From ACM TechNews | April 29, 2011
Microsoft researchers have developed RePriv, a browser that analyzes users' online behavior and controls how their personal information is released to sites that...Technology Review From ACM TechNews | April 21, 2011
They're the scourge of the Internet—networks containing thousands or even millions of virus-infected, remote-controlled PCs. These so-called "botnets" send out...Technology Review From ACM News | April 13, 2011
Google may be built on an algorithm for taming the Web, but yesterday the company added social features that will let your friends help determine what ranks high...Technology Review From ACM News | April 1, 2011
Researchers who have spent the last two years studying the security of car computer systems have revealed that they can take control of vehicles wirelessly.Technology Review From ACM News | March 14, 2011
Handing sensitive data over to a cloud computing provider makes many companies skittish. But new software, called HomeAlone, could help them come to terms with...Technology Review From ACM News | March 11, 2011
At the Shmoocon conference, researchers demonstrated how hackers are using printers to infiltrate corporate computer networks. Printers are "totally integrated...Technology Review From ACM TechNews | January 24, 2011
A method for breaking into and stealing cars that have keyless entry and starting systems has been found by ETH Zurich researchers, who were able to gain entry...Technology Review From ACM TechNews | January 6, 2011
Low-end mobile phones are vulnerable to hackers using short message service (SMS) communications, according to research presented at a recent conference in Germany...Technology Review From ACM TechNews | January 5, 2011
How the inventor of the PalmPilot studied the workings of the human brain to help companies turn a deluge of data into business intelligence.Technology Review From ACM News | December 21, 2010
Researchers created their own, imprisoned, network of zombie computers to better learn how to take down those at large on the Internet.Technology Review From ACM News | December 17, 2010
A new technique from Microsoft Research Silicon Valley could be used to target advertising to users' surroundings without their knowledge.Technology Review From ACM News | December 17, 2010
Early 2011 will see printed memory devices in toys and printed sensors in packages used to ship drugs.Technology Review From ACM News | December 3, 2010
Computer scientists reveal malware that attacks specific processors rather than the operating system that runs on them.Technology Review From ACM News | November 12, 2010