A University of California, Berkeley study found that Web users may be tracked by dozens of sources on a visit to a single site. Within a single month, the researchers...Dark Reading From ACM TechNews | June 8, 2009
China will require that Web filtering software be included with all computers sold in the country, another step up in its efforts to control pornography and other...IDG News Service From ACM News | June 8, 2009
Arizona election officials demonstrated their Internet voting system at ACM's recent Computers, Freedom, and Privacy Conference in Washington, D.C. For the 2008...Wired News From ACM TechNews | June 5, 2009
Imagine if today at work you were watched for every single minute. Not just when you arrived and left, or when you went for your lunch. But every task, every conversation...BBC News From ACM News | June 4, 2009
The National Institute of Standards and Technology (NIST) recently provided the Election Assistance Commission (EAC) with a draft revision to the 2005 U.S. federal...NIST Tech Beat From ACM TechNews | June 3, 2009
A U.C. Berkeley report shows that most Internet users don't understand Web site privacy policies, and that major online businesses like Google Inc. freely gather...San Francisco Business Times From ACM News | June 3, 2009
The National Security Council's Melissa Hathaway sought the advice of a variety of computer security experts when she conducted the recently completed 60-day review...The National Science Foundation From ACM TechNews | June 1, 2009
U.S. President Barack Obama announced that the country's disjointed efforts to "deter, prevent, detect, and defend" against cyberattacks will now be run by the...The New York Times From ACM TechNews | June 1, 2009
The U.S. government’s urgent push into cyberwarfare has set off a rush among the biggest military companies for billions of dollars in new defense contracts. The...The New York Times From ACM News | June 1, 2009
The U.S. Pentagon is planning to establish a new cyberwarfare command as a complement to a soon-to-be-announced civilian computer network safety overhaul, according...The New York Times From ACM TechNews | May 29, 2009
Craigslist founder Craig Newmark will give the keynote address at ACM's 2009 Conference on Computers, Freedom and Privacy (CFP), which takes place from June 1-4...AScribe Newswire From ACM TechNews | May 29, 2009
A research team led by Northeastern University Center for Complex Network Research director Albert-Laszlo Barabasi set out to investigate why smartphone and mobile...National Science Foundation From ACM TechNews | May 27, 2009
U.S. President Barack Obama is expected to announce that he will create a cyberczar position, adding a senior White House official who will have broad authority...The Washington Post From ACM TechNews | May 26, 2009
The Internet's underlying technology can be harnessed to let people exchange secret messages, perhaps allowing free, coded speech under oppressive regimes. So says...New Scientist From ACM News | May 26, 2009
To stay one jump ahead of fraudsters and their automated rogue programs, researchers are devising more versions of CAPTCHA (Completely Automated Public Turing test...The New York Times From ACM News | May 26, 2009
Researchers from the Information Security Group (ISG) at Royal Holloway, University of London have discovered an underlying flaw in the OpenSSH encryption protocol...ZDNet K From ACM TechNews | May 21, 2009
The "secret questions" that protect online accounts and passwords may be far less secure than commonly believed, largely because their answers are often far too...Technology Review From ACM TechNews | May 18, 2009
Researchers are improving unmanned helicopters' capabilities to address regulatory requirements and commercial uses.Gregory Goth From Communications of the ACM | June 1, 2009
Entertainment businesses say digital rights management prevents the theft of their products, but access control technologies have been a uniform failure when it...Leah Hoffmann From Communications of the ACM | June 1, 2009
Medical researchers have long dreamed of "magic bullets" that go directly where they are needed. Now micromedicine and nanotechnology are making a range of molecules...Don Monroe From Communications of the ACM | June 1, 2009