Think that turning off cookies and turning on private browsing makes you invisible on the web? Think again.
The Electronic Frontier Foundation (EFF) has launched...WebMonkey From ACM News | January 28, 2010
An innovative computational technique that draws on statistics, imaging, and other disciplines has the capability to detect errors in sensitive technological systems...niversity Corporation for Atmospheric Research From ACM News | January 28, 2010
The staggering cost and impact of cyber attacks on critical infrastructure such as electrical grids, oil and gas production, telecommunications and transportation...McAfee Inc. From ACM News | January 28, 2010
Researchers from the International Computer Science Institute and the University of California, San Diego have developed a method for blocking the most common type...New Scientist From ACM TechNews | January 27, 2010
U.S. businesses and government agencies are facing increasing risks of potential cyber attacks from China, according to a recent report. And IT departments that...Insurance Journal From ACM News | January 27, 2010
One of the trickiest problems in cyber security is trying to figure who’s really behind an attack. Darpa, the Pentagon agency that created the Internet, is trying...Wired From ACM News | January 26, 2010
On a Monday morning earlier this month, top Pentagon leaders gathered to simulate how they would respond to a sophisticated cyberattack aimed at paralyzing the...The New York Times From ACM News | January 26, 2010
Cybersecurity systems are tough to crack, but not tough enough. A Clarkson University professor is developing software programs that will test cybersecurity systems...Clarkson niversity From ACM News | January 26, 2010
Type systems are moving beyond the realm of data structure and into more complex domains like security and networking.Alex Wright From Communications of the ACM | February 1, 2010
Recent academic research is advancing the development of secure multi-party computation (SMC), an security technique aimed at protecting data for various online...By Bob Violino From ACM News | January 22, 2010
In the late 1990s and early 2000s, the idea of grid computing, a type of distributed computing that harnesses the power of many computers to handle large computational...Enterprise Storage Forum From ACM News | January 22, 2010
The federal government needs to address electronic security to calm Americans' uncertainty about cloud computing and secure its privacy, according to industry representatives...infoZine From ACM News | January 22, 2010
Back at the dawn of the Web, the most popular account password was “12345.”
Today, it’s one digit longer but hardly safer: “123456.”
Despite all the reports...The New York Times From ACM News | January 21, 2010
Weizmann Institute of Science researchers recently created a theoretical attack capable of breaking the encryption protocol that is planned for use on 3G telephony...Telecoms.com From ACM TechNews | January 21, 2010
Is there a recipe a scientist might follow to spur creativity and cook up new discoveries? Cyber security expert Kevin Fu of the University of Massachusetts Amherst...niversity of Massachusetts Amherst From ACM News | January 21, 2010
Google has received a patent for the technique known as MapReduce. The patent, number 7,650,331, applied for in 2004, is entitled "System and method for efficient...The H From ACM News | January 20, 2010
The crown jewels of Google, Cisco Systems or any other technology company are the millions of lines of programming instructions, known as source code, that make...The New York Times From ACM News | January 20, 2010
The earthquake in Haiti has motivated many people to make contributions to help. "Unfortunately, these events also bring out the con artists and scammers who are...Purdue University News From ACM News | January 19, 2010
"A fleet of fighter planes is not necessary to attack a power station; a keyboard is sufficient. And if you don't have the skills, there are enough mercenary hackers...University of Haifa From ACM News | January 19, 2010