Dartmouth College researchers who pioneered the Public Key Infrastructure (PKI) have assumed leadership roles in the establishment of Internet security standards...Dartmouth News From ACM TechNews | July 10, 2009
In what they say is the first step toward a new era in law enforcement techniques, city officials in Lancaster, Calif. are testing a small airplane mounting a high...Antelope Valley Press From ACM News | July 10, 2009
Juniper security researcher Barnaby Jack canceled plans for a live demonstration of the insecurity of automatic teller machines (ATMs) at the upcoming Black Hat...Technology Review From ACM TechNews | July 9, 2009
Scientists from 41 European research and industrial organizations recently sent secure, quantum encrypted information over an eight-node, mesh network. By creating...The Institute of Physics From ACM TechNews | July 8, 2009
University of Twente researcher Damiano Bolzoni has developed SilentDefense, an anomaly network intrusion detection system that could lead to a new generation of...The niversity of Twente From ACM TechNews | July 8, 2009
Carnegie Mellon University researchers have shown that public information readily gleaned from governmental sources, commercial databases, or online social networks...EurekAlert From ACM News | July 7, 2009
The U.S. Pentagon's decision last week to open a cybercommand for both offensive and defensive cyberwarfare activities raises a host of questions. U.S. Defense...The Washington Times From ACM TechNews | July 6, 2009
The American and European chambers of commerce in China have welcomed a decision by Beijing to delay an order that new computers sold in the country be equipped...Agence France-Presse From ACM News | July 1, 2009
Barbara Liskov muses about the creative process of problem solving, finding the perfect design point, and pursuing a research path.Karen A. Frenkel From Communications of the ACM | July 1, 2009
Computer technology has enhanced lives in countless ways, but some experts believe it might be affecting people's ability to think deeply.Samuel Greengard From Communications of the ACM | July 1, 2009
Several software projects are narrowing the performance gap between browser-based applications and their desktop counterparts. In the process, they're creating...Kirk L. Kroeker From Communications of the ACM | July 1, 2009
Thanks to computer scientists like Barbara Liskov, researchers are making major progress with cost-efficient fault tolerance for Web-based systems.Alex Wright From Communications of the ACM | July 1, 2009
The Computing Innovation Fellows (CIFellows) Project has received 526 applications for CIFellowships from 145 distinct colleges and universities. The applications...Computing Community Consortium From ACM TechNews | June 29, 2009
Harbor Branch Oceanographic Institute at Florida Atlantic University has received $2 million from the U.S. Department of Defense, Office of Naval Research, to continue...Florida Atlantic niversity From ACM News | June 29, 2009
A lattice approach could be used to develop fully homomorphic encryption solutions, says IBM researcher Craig Gentry, a Stanford University Ph.D. candidate. Gentry's...InternetNews.com From ACM TechNews | June 26, 2009
Some Iranian protestors dissatisfied with their government's response to the disputed election are using The Onion Router (TOR), an Internet encryption program...The Washington Times From ACM TechNews | June 26, 2009
Some experts project that the Obama administration's cybersecurity push will expand two-year colleges' role in supplying cybersecurity workers to government agencies...The Chronicle of Higher Education From ACM TechNews | June 26, 2009
Britain is hiring former computer hackers to join a new security unit aimed at protecting cyberspace from foreign spies, thieves and terrorists, the country's terrorism...The Associated Press From ACM News | June 26, 2009
The secret questions some Web sites ask new users to answer for verification purposes in case a password is forgotten are actually far less secure and far easier...New Scientist From ACM TechNews | June 25, 2009
The U.S. military announced a new "cyber command" designed to wage digital warfare and to bolster defenses against mounting threats to its computer networks. Defense...Agence France-Presse From ACM News | June 24, 2009