In the wake of strong U.S. government statements condemning WikiLeaks' recent publishing of 77,000 Afghan War documents, the secret-spilling site has posted a mysterious...Wired From ACM News | August 2, 2010
A hacker group known as the Ninjas has created what may be the best DefCon badge ever. The badge allows wireless ninja battle between badge holders. Unlike the...Wired From ACM News | July 28, 2010
Prosecutors in a New Jersey ticket scalping case are pushing the envelope on the federal computer hacking law, setting a precedent that could make it a felony to...Wired From ACM News | July 8, 2010
Would-be whistle-blowers hoping to leak documents to Wikileaks face a potentially frustrating surprise. Wikileaks’ submission process, which had been degraded for...Wired From ACM News | July 1, 2010
It's an agency staffed by some of the government's top hackers, brainiest cryptographers, and most sophisticated network defenders. But when employees at the NSA...Wired From ACM News | June 24, 2010
A U.S. Senate draft bill would give the federal government the power to take over civilian networks' security, if there's an "imminent cyber threat" and provides...Wired From ACM News | June 3, 2010
Members of the military’s new Cyber Command insist that they’ve got no interest in taking over civilian Internet security--or even in becoming the Pentagon’s primary...Wired From ACM News | May 28, 2010
Software systems could one day analyze everything from blurry war-zone footage to the subtle sarcasm in a written paragraph, thanks to two unassuming scientists...Wired From ACM News | May 24, 2010
Can software spot a cyberspy’s tricky intentions, before he’s started to help the other side? The way-out researchers at Darpa think so.Wired From ACM News | May 21, 2010
Investigators were able to track wannabe terrorist Faisal Shahzad through his anonymous, pre-paid cell phone--exactly how, they won’t say. But there was a tantalizing...Wired From ACM News | May 5, 2010
The legal debate over America's undeclared drone war in Pakistan is getting sharper: In a congressional hearing yesterday, a prominent law professor suggested that...Wired From ACM News | April 29, 2010
Intel showed off an experimental device last week in China that could someday substantially cut the costs of wiring homes and offices for energy efficiency, one...Wired From ACM News | April 19, 2010
Networks that are resilient on their own become fragile and prone to catastrophic failure when connected, suggests a new study with troubling implications for tightly...Wired From ACM News | April 16, 2010
The country’s swift deployment of smart-grid technology has security professionals concerned that utilities and smart-meter vendors are repeating the mistakes made...Wired From ACM News | March 5, 2010
Howard Schmidt, the new cybersecurity czar for the Obama Administration, has a short answer for the drumbeat of rhetoric claiming the United States is caught up...Wired.com From ACM News | March 5, 2010
The U.S. Defense Advanced Research Projects Agency's (DARPA's) future plans call for crowdsourcing military intelligence, creating an immune system for Defense...Wired News From ACM TechNews | February 5, 2010
One of the trickiest problems in cyber security is trying to figure who’s really behind an attack. Darpa, the Pentagon agency that created the Internet, is trying...Wired From ACM News | January 26, 2010
Sure, we’re all plugged in and online 24/7. But fewer American kids are growing up to be bona fide computer geeks. And that poses a serious security risk for the...Wired From ACM News | January 15, 2010
By turning the brain cell activity underlying fly eyesight into mathematical equations, researchers have found an ultra-efficient method for pulling motion patterns...Wired.com From ACM News | November 12, 2009
A scan of the Internet by Columbia University researchers searching for vulnerable embedded devices has found that nearly 21,000 routers, Webcams, and VoIP products...Wired News From ACM TechNews | October 26, 2009