The U.S. government’s urgent push into cyberwarfare has set off a rush among the biggest military companies for billions of dollars in new defense contracts. The...The New York Times From ACM News | June 1, 2009
The U.S. Pentagon is planning to establish a new cyberwarfare command as a complement to a soon-to-be-announced civilian computer network safety overhaul, according...The New York Times From ACM TechNews | May 29, 2009
Craigslist founder Craig Newmark will give the keynote address at ACM's 2009 Conference on Computers, Freedom and Privacy (CFP), which takes place from June 1-4...AScribe Newswire From ACM TechNews | May 29, 2009
A research team led by Northeastern University Center for Complex Network Research director Albert-Laszlo Barabasi set out to investigate why smartphone and mobile...National Science Foundation From ACM TechNews | May 27, 2009
U.S. President Barack Obama is expected to announce that he will create a cyberczar position, adding a senior White House official who will have broad authority...The Washington Post From ACM TechNews | May 26, 2009
The Internet's underlying technology can be harnessed to let people exchange secret messages, perhaps allowing free, coded speech under oppressive regimes. So says...New Scientist From ACM News | May 26, 2009
To stay one jump ahead of fraudsters and their automated rogue programs, researchers are devising more versions of CAPTCHA (Completely Automated Public Turing test...The New York Times From ACM News | May 26, 2009
Researchers from the Information Security Group (ISG) at Royal Holloway, University of London have discovered an underlying flaw in the OpenSSH encryption protocol...ZDNet K From ACM TechNews | May 21, 2009
The "secret questions" that protect online accounts and passwords may be far less secure than commonly believed, largely because their answers are often far too...Technology Review From ACM TechNews | May 18, 2009
Researchers are improving unmanned helicopters' capabilities to address regulatory requirements and commercial uses.Gregory Goth From Communications of the ACM | June 1, 2009
Entertainment businesses say digital rights management prevents the theft of their products, but access control technologies have been a uniform failure when it...Leah Hoffmann From Communications of the ACM | June 1, 2009
Medical researchers have long dreamed of "magic bullets" that go directly where they are needed. Now micromedicine and nanotechnology are making a range of molecules...Don Monroe From Communications of the ACM | June 1, 2009
University of Illinois at Chicago (UIC) researchers will present a new way of defending against cross-site scripting attacks at the upcoming IEEE Symposium on Security...Technology Review From ACM TechNews | May 15, 2009
A recently published report from the National Research Council (NRC) contends that there has to be more public disclosure and informed debate about cyberarms and...Network World From ACM TechNews | May 15, 2009
Researchers at the University of Science and Technology of China say they have developed the first optical quantum cryptography network. The quantum communication...Chinese Academy of Sciences From ACM TechNews | May 13, 2009
The Internet is rife with cybercriminals and online eavesdroppers, and countering this threat is the job of cybersleuths. One of the key tools in cybersleuths'...The New York Times From ACM TechNews | May 13, 2009
A new cryptography approach based on the mathematical theory of elliptic curves is considered a leading candidate to replace the widely used RSA public key security...European Science Foundation From ACM TechNews | May 13, 2009
A lost or stolen laptop or notebook computer is replaceable; the stolen data inside it may produce real owner's anxiety. Which makes Fujitsu's newly announced "security...The New York Times From ACM News | May 13, 2009
A leading cyber security specialist said last week that China has developed its own ultra-secure operating system for a strategic edge in its cyber warfare with...WorldTribune.com From ACM News | May 13, 2009
University of Michigan professor Alex Halderman wants to research whether the anti-piracy software built into computer games makes computers more vulnerable to...niversity of Michigan News Service From ACM TechNews | May 11, 2009