University of California, Irvine (UC Irvine) researchers have developed a new method for blacklisting spam, distributed denial-of-service attacks, worms, and other...Dark Reading From ACM TechNews | September 2, 2009
The second draft of a U.S. Senate cybersecurity bill scales back language that would give the president the ability to shut down the Internet in an emergency....Network World From ACM TechNews | September 2, 2009
When eBay Inc.'s PayPal unit suffered a worldwide outage early last month, Sailrite Enterprises Inc., a sailing supply company based in Churubusco, Ind., lost its...Computerworld From ACM News | September 2, 2009
As federal agencies continue to brainstorm ways to effectively oversee cybersecurity, the U.S. Department of Homeland Security (DHS) is increasing its foothold...Information Week From ACM TechNews | September 1, 2009
Carnegie Mellon University has received a five-year, $3 million grant from the National Science Foundation to launch a Ph.D. program in usable privacy and security...Carnegie Mellon News From ACM TechNews | August 27, 2009
Like a ghost ship, a rogue software program that glided onto the Internet last November has confounded the efforts of top security experts to eradicate the program...The New York Times From ACM News | August 27, 2009
A Worcester Polytechnic Institute (WPI) study by professor Craig Wills found that the practices of many popular social networking sites can make personal information...Worcester Polytechnic Institute From ACM TechNews | August 26, 2009
Governments in the Middle East and north Africa routinely block and censor Web sites to control political discussions, according to a new report on the region by...New Scientist From ACM TechNews | August 25, 2009
Scientists share knowledge and seek collaborators at computational sustainability conference.Karen A. Frenkel From Communications of the ACM | September 1, 2009
Researchers are addressing the computing challenges of older individuals, whose needs are different — and too often disregarded.Samuel Greengard From Communications of the ACM | September 1, 2009
Researchers working in medical nanorobotics are creating technologies that could lead to novel health-care applications, such as new ways of accessing areas of...Kirk L. Kroeker From Communications of the ACM | September 1, 2009
The promise of parallel computing has run afoul of the harsh reality of Amdahl's Law, which puts a ceiling on the benefit of converting sequential code to parallel...Gregory Goth From Communications of the ACM | September 1, 2009
U.S. government, industry, and academia are using cybersecurity competitions to interest high school and college students about the career opportunities in cybersecurity...Paul Hyman From ACM News | August 24, 2009
A proposed plan to reorganize the U.S. National Institute of Standards and Technology's (NIST's) IT Laboratory would close the Computer Security Division and distribute...Government Computer News From ACM TechNews | August 20, 2009
Google developed a new approach to mobile phone security with its open source Android operating system. Android developer Rich Cannings says there must be a balance...Technology Review From ACM TechNews | August 18, 2009
Russian hackers stole U.S. identities and software tools for use in a cyberattack against Georgian government Web sites during the war between Russia and Georgia...The Wall Street Journal From ACM TechNews | August 17, 2009
A system that fights highly infectious computer viruses by embedding defense mechanisms in key parts of the Internet has been developed by University of North Carolina...New Scientist From ACM TechNews | August 17, 2009
U.S. Department of Homeland Security secretary Janet Napolitano recently affirmed that her staff is still weighing options about how best to assimilate the public...CongressDaily From ACM TechNews | August 17, 2009
Computer scientists from the University of California, San Diego (UCSD), the University of Michigan, and Princeton University have demonstrated that a Sequoia electronic...niversity of California, San Diego From ACM TechNews | August 12, 2009
At the 9th annual Privacy Enhancing Technologies Symposium, security researchers discussed alternatives to existing systems designed to help Internet users maintain...Technology Review From ACM TechNews | August 13, 2009