The most common digital security technique used to protect both media copyright and Internet communications has a major weakness, University of Michigan computer...niversity of Michigan From ACM News | March 4, 2010
The Obama administration has declassified part of its plan to improve the security of cyberspace in an attempt to cultivate greater collaboration between government...Financial Times From ACM TechNews | March 3, 2010
Vienna University of Technology researchers have developed the "deanonymization" attack as a way to reveal the identity of Internet users based on their interactions...Dark Reading From ACM TechNews | March 3, 2010
In a dimly lit chamber festooned with wires and hidden in one of California’s largest data centers, Tim Pozar is changing the shape of the Internet.
He is using...The New York Times From ACM News | March 3, 2010
Karlsruhe Institute of Technology scientists will demonstrate a language-to-language translation device at the upcoming CeBIT conference. The device combines automatic...Karlsruche Institute of Technology From ACM TechNews | March 3, 2010
The final publication of the 93-page Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach (NIST Special...National Institute of Standards and Technology From ACM News | March 3, 2010
A system that can more effectively detect possible cyber security attacks within large organizations—including government agencies—is being developed with the assistance...Oak Ridge National Laboratory From ACM News | March 3, 2010
The issue of security is holding back its full potential of cloud computing. This was the gist of the keynote message presented Tuesday (March 2) by Art Coviello...ZDNet Asia From ACM News | March 3, 2010
The computer attack which led Google to threaten leaving China and created a firestorm between Washington and Beijing appears to have been deployed by amateurs,...CNN From ACM News | March 3, 2010
Technology that depends on satellite-navigation signals is increasingly threatened by attack from widely available equipment, experts say.
While "jamming" sat-nav...BBC News From ACM News | February 25, 2010
A panel of experts told U.S. senators at a recent hearing of the Senate Committee on Commerce, Science, and Transportation that the United States would be defeated...CNet From ACM TechNews | February 24, 2010
SRI International and Georgia Tech researchers have developed Block All Drive-By Download Exploits (BLADE), free software that can stop Internet attacks brought...Technology Review From ACM TechNews | February 24, 2010
Researchers are focusing on the so-called "removal chain" in an attempt to save landfill space, improve recycling rates, and trim the flow of toxic materials into...Samuel Greengard From Communications of the ACM | March 1, 2010
As Web technologies move beyond two-way interactive capabilities to facilitate more dynamic and pervasive experiences, the Web is quickly advancing toward its third...Kirk L. Kroeker From Communications of the ACM | March 1, 2010
Biologists can benefit from learning and using the tools of computer science, but several real-world obstacles remain.Gregory Goth From Communications of the ACM | March 1, 2010
European researchers are proposing a paradigm-shifting solution to trusted computing that offers better security and authentication with none of the drawbacks that... From ICT Results | February 24, 2010
Carnegie Mellon University's Lorrie F. Cranor will discuss the risk and benefits of online services that collect and use location information to joint meetings...Carnegie Mellon News From ACM News | February 24, 2010
German researchers have developed a random number generator that uses a computer memory element, a flip-flop, to create an extra layer of randomness. AlphaGalileo From ACM TechNews | February 22, 2010
University of Calgary (UC) researchers are developing a range of technologies to prevent and detect cyberattacks and botnets. "It's an issue of scale," says UC...niversity of Calgary From ACM TechNews | February 22, 2010
Intellectual property thieves who engage in so-called pod-slurping attacks leave a "USB fingerprint," according to Vasilios Katos and Theodoros Kavallaris of the...New Scientist From ACM TechNews | February 22, 2010