Massachusetts Institute of Technology researchers have developed a system to keep Web servers running even when they are under attack from cybercriminals. MIT News From ACM TechNews | March 19, 2010
Cyber-criminals are using fake e-mails to target Facebook users and deliver computer viruses that were being detected only by one-third of the 42 most common anti...niversity of Alabama at Birmingham From ACM News | March 19, 2010
The private e-mails and texts that keep you closely connected could quickly turn embarrassing if made public by a spurned friend or partner. How much privacy can...Laurie Rowell From ACM News | March 16, 2010
KDDI Corp. has developed mobile phone technology that detects even the tiniest actions of the user by analyzing the movement of accelerometers embedded in the devices...BBC News From ACM TechNews | March 17, 2010
If a stranger came up to you on the street, would you give him your name, Social Security number and e-mail address?
Yet people often dole out all kinds of personal...The New York Times From ACM News | March 17, 2010
University of Tulsa researchers have published a legal study on three "technically feasible" compulsory vaccination scenarios that governments could consider to...New Scientist From ACM TechNews | March 16, 2010
Cutting-edge surveillance software that automatically detects human motion, behaviour and facial expressions, generates a running commentary of what's happening... From ICT Results | March 16, 2010
Advertisers have been able to direct online messages based on demographics, income and even location, but one element has been largely missing until recently:...The New York Times From ACM News | March 12, 2010
It started with Michael Coppola taking things apart at the age of five: the remote control, his mother's house lamps, the family's VCR. He was curious about how...Newsweek From ACM News | March 11, 2010
Semantic Web technology will be a key tool in the development of a standard policy language for sharing information between agencies, countries, and organizations...PhysOrg.com From ACM TechNews | March 10, 2010
Thanks to smart phones and other mobile devices, the number of applications that make use of geolocation data is exploding. But developers and device makers face...Technology Review From ACM News | March 8, 2010
Katholieke Universiteit Leuven professor Bart Preneel says the SHA-3 hash algorithm selected by the National Institute of Standards and Technology will need to...Government Computer News From ACM TechNews | March 8, 2010
Urgent warnings have been circulated throughout NATO and the European Union for secret intelligence material to be protected from a recent surge in cyberwar attacks...Times Online From ACM News | March 8, 2010
The country’s swift deployment of smart-grid technology has security professionals concerned that utilities and smart-meter vendors are repeating the mistakes made...Wired From ACM News | March 5, 2010
Howard Schmidt, the new cybersecurity czar for the Obama Administration, has a short answer for the drumbeat of rhetoric claiming the United States is caught up...Wired.com From ACM News | March 5, 2010
China is in consultations with technology giant Google to resolve its dispute with the company, which has threatened to abandon the Chinese market over hacking...Reuters From ACM News | March 5, 2010
U.S. Department of Homeland Security Secretary Janet Napolitano delivered a keynote address which focused on cybersecurity at the RSA Conference in San Francisco...InfoSecurity From ACM News | March 4, 2010
The most common digital security technique used to protect both media copyright and Internet communications has a major weakness, University of Michigan computer...niversity of Michigan From ACM News | March 4, 2010
The Obama administration has declassified part of its plan to improve the security of cyberspace in an attempt to cultivate greater collaboration between government...Financial Times From ACM TechNews | March 3, 2010
Vienna University of Technology researchers have developed the "deanonymization" attack as a way to reveal the identity of Internet users based on their interactions...Dark Reading From ACM TechNews | March 3, 2010