Programmers from China and Russia have dominated an international competition on everything from writing algorithms to designing components. Whether the outcome...Computerworld From ACM News | June 9, 2009
China on Tuesday (June 9) defended a new requirement that personal computers sold in the country carry a software that filters online content, saying the program...The Associated Press From ACM News | June 9, 2009
Passenger screenings at the nation's airports can be conducted more efficiently without compromising aviation security, according to research at Virginia Commonwealth...Virginia Commonwealth University From ACM News | June 9, 2009
A major aspect of U.S. President Barack Obama's plan to improve the country's cyberdefenses involves maximizing government investment in cybersecurity research...NextGov.com From ACM TechNews | June 8, 2009
A University of California, Berkeley study found that Web users may be tracked by dozens of sources on a visit to a single site. Within a single month, the researchers...Dark Reading From ACM TechNews | June 8, 2009
China will require that Web filtering software be included with all computers sold in the country, another step up in its efforts to control pornography and other...IDG News Service From ACM News | June 8, 2009
Arizona election officials demonstrated their Internet voting system at ACM's recent Computers, Freedom, and Privacy Conference in Washington, D.C. For the 2008...Wired News From ACM TechNews | June 5, 2009
Imagine if today at work you were watched for every single minute. Not just when you arrived and left, or when you went for your lunch. But every task, every conversation...BBC News From ACM News | June 4, 2009
The National Institute of Standards and Technology (NIST) recently provided the Election Assistance Commission (EAC) with a draft revision to the 2005 U.S. federal...NIST Tech Beat From ACM TechNews | June 3, 2009
A U.C. Berkeley report shows that most Internet users don't understand Web site privacy policies, and that major online businesses like Google Inc. freely gather...San Francisco Business Times From ACM News | June 3, 2009
The National Security Council's Melissa Hathaway sought the advice of a variety of computer security experts when she conducted the recently completed 60-day review...The National Science Foundation From ACM TechNews | June 1, 2009
U.S. President Barack Obama announced that the country's disjointed efforts to "deter, prevent, detect, and defend" against cyberattacks will now be run by the...The New York Times From ACM TechNews | June 1, 2009
The U.S. government’s urgent push into cyberwarfare has set off a rush among the biggest military companies for billions of dollars in new defense contracts. The...The New York Times From ACM News | June 1, 2009
The U.S. Pentagon is planning to establish a new cyberwarfare command as a complement to a soon-to-be-announced civilian computer network safety overhaul, according...The New York Times From ACM TechNews | May 29, 2009
Craigslist founder Craig Newmark will give the keynote address at ACM's 2009 Conference on Computers, Freedom and Privacy (CFP), which takes place from June 1-4...AScribe Newswire From ACM TechNews | May 29, 2009
A research team led by Northeastern University Center for Complex Network Research director Albert-Laszlo Barabasi set out to investigate why smartphone and mobile...National Science Foundation From ACM TechNews | May 27, 2009
U.S. President Barack Obama is expected to announce that he will create a cyberczar position, adding a senior White House official who will have broad authority...The Washington Post From ACM TechNews | May 26, 2009
The Internet's underlying technology can be harnessed to let people exchange secret messages, perhaps allowing free, coded speech under oppressive regimes. So says...New Scientist From ACM News | May 26, 2009
To stay one jump ahead of fraudsters and their automated rogue programs, researchers are devising more versions of CAPTCHA (Completely Automated Public Turing test...The New York Times From ACM News | May 26, 2009
Researchers from the Information Security Group (ISG) at Royal Holloway, University of London have discovered an underlying flaw in the OpenSSH encryption protocol...ZDNet K From ACM TechNews | May 21, 2009