More than a year after being launched by hackers on a campaign to infect computers running Microsoft Windows, the Conficker worm's effects are still being felt....Scientific American From ACM News | February 4, 2010
Business spending on technology goods and services is returning as the economy mends, pumping new life into suppliers such as Cisco Systems Inc., though it has...The Wall Street Journal From ACM News | February 4, 2010
The world's largest Internet search company and the world's most powerful electronic surveillance organization are teaming up in the name of cybersecurity.
Under...The Washington Post From ACM News | February 4, 2010
count likely knows that police can peek inside it if they have a paper search warrant.
But cybercrime investigators are frustrated by the speed of traditionalone...CNET From ACM News | February 3, 2010
The China-U.S. diplomatic spat over cyberattacks on Google has highlighted the growing significance of the Internet as a theater of combat.
Deputy Defense Secretary...Time From ACM News | February 3, 2010
Despite widespread speculation, nothing beyond what Steve Jobs announced last week is known about the A4 chip at the heart of the Apple iPad.
Jobs described the...Technology Review From ACM News | February 3, 2010
Looking like a robotic mule, the Legged Squad Support System (LS3) being developed by the Defense Advanced Research Projects Agency will carry 400 pounds of equipment...Defense Industry Daily From ACM News | February 2, 2010
Being hacked by a robot requires much less hardware than I expected. There’s no need for virtual-reality goggles or 3D holograms. There are no skullcaps studded...Popular Mechanics From ACM News | February 1, 2010
Princeton University researchers have developed power-generating rubber films that can harness natural body movements such as breathing and walking to power electronic...Princeton Engineering News From ACM TechNews | February 1, 2010
The situation was desperate for the Denver Broncos. On the first Sunday of the National Football League’s 2009 season, with only 28 seconds left in the game, they...Wired From ACM News | February 1, 2010
In computing, the vision always precedes the reality by a decade or more. The pattern has held true from the personal computer to the Internet, as it takes time...The New York Times From ACM News | February 1, 2010
Supercomputing has helped astrophysicists create massive models of the universe, but such simulations remain out of reach for many in the United States and around...Space.com From ACM News | January 29, 2010
The young woman seated next to us at the sushi bar exuded a vaguely exotic air; her looks and style, we thought, made it likely that she was not American born.
...The New York Times From ACM News | January 28, 2010
Think that turning off cookies and turning on private browsing makes you invisible on the web? Think again.
The Electronic Frontier Foundation (EFF) has launched...WebMonkey From ACM News | January 28, 2010
An innovative computational technique that draws on statistics, imaging, and other disciplines has the capability to detect errors in sensitive technological systems...niversity Corporation for Atmospheric Research From ACM News | January 28, 2010
Almost three decades ago, Richard Feynman — known popularly as much for his bongo drumming and pranks as for his brilliant insights into physics — told an electrified...Wired From ACM News | January 28, 2010
Apple has been granted a patent for a multi-touch display that can sense when and where a finger is near the screen. The patent was one of 13 granted to Apple,U...NetworkWorld From ACM News | January 27, 2010
Researchers from the San Diego Supercomputer Center at UC San Diego have joined forces with the Department of Radiation Oncology in the university's School of Medicine...niversity of California, San Diego From ACM News | January 27, 2010
One of the trickiest problems in cyber security is trying to figure who’s really behind an attack. Darpa, the Pentagon agency that created the Internet, is trying...Wired From ACM News | January 26, 2010
On a Monday morning earlier this month, top Pentagon leaders gathered to simulate how they would respond to a sophisticated cyberattack aimed at paralyzing the...The New York Times From ACM News | January 26, 2010