Attacks against smartphones are likely to proliferate because of their growing ubiquity and the sensitive information they carry. However, researchers believe...Technology Review From ACM TechNews | September 10, 2010
Stanford University researchers have found that mobile websites are extremely vulnerable to attacks from malicious sites using a technique known as tapjacking,...Technology Review From ACM TechNews | August 18, 2010
Hackers could "hijack" the wireless pressure sensors built into many cars' tires, researchers have found. Criminals might then track a vehicle or force its electronic...Technology Review From ACM News | August 10, 2010
The hurried deployment of smart-grid technology could leave critical infrastructure and private homes vulnerable to hackers. Security experts at the Black Hat...Technology Review From ACM News | August 3, 2010
Attorney General Eric Holder's new probe into Wikileaks's posting of 91,000 war documents will likely find that tracing the path of the documents back through the...Technology Review From ACM News | July 29, 2010
Researchers at Microsoft have come up with a way to create easy-to-remember passwords without making a system more vulnerable to hackers.Technology Review From ACM News | July 20, 2010
Intel engineers have created computer processors with circuits capable of random behavior, a development that could lead to secure cryptography keys.Technology Review From ACM TechNews | June 30, 2010
A novel technique could see future Web services work with sensitive data without ever being able to read it. Several implementations of a mathematical proof unveiled...Technology Review From ACM News | June 11, 2010
Security experts said this week that they were cheered by calls from General Keith Alexander, head of the new U.S. Cyber Command, for global rules of engagement...Technology Review From ACM News | June 10, 2010
The ability to access the code of open-source applications may give attackers an edge in developing exploits for the software, according to a paper analyzing two...Technology Review From ACM News | June 7, 2010
Cell phone companies are finding that they're sitting on a gold mine--in the form of the call records of their subscribers.Technology Review From ACM News | May 27, 2010
Physicists have mounted the first successful attack of its kind on a commercial quantum cryptography system.Technology Review From ACM News | May 20, 2010
UCLA researchers have developed a type of quantum cryptography, which guarantees that only a person at a certain location can read an encrypted message. Technology Review From ACM TechNews | May 17, 2010
Convincing Internet service providers to pinpoint infected computers on their networks could eliminate the lion's share of zombie computers responsible for churning...Technology Review From ACM News | May 5, 2010
In a test of Google's privacy protections, European researchers were able to hijack Google's personalized search suggestions to reconstruct users' Web search histories...Technology Review From ACM TechNews | April 23, 2010