Distributed denial of service (DDOS) attacks are now being used by governments as another way to counter opposition, warns Arbor Networks senior security researcher...IDG News Service From ACM TechNews | March 17, 2009
World Wide Web Consortium director Sir Tim Berners-Lee says the Semantic Web will improve online privacy protection by allowing Internet users to control who can...ZDNet K From ACM TechNews | March 16, 2009
Web pioneer and Massachusetts Institute of Technology professor Sir Tim Berners-Lee says more protection is needed to prevent Internet snooping and ensure that...BBC News From ACM TechNews | March 13, 2009
A USB memory stick that can guarantee secure banking transactions even if a PC is tainted by malware has been developed by IBM's Zurich research laboratory. InfoWorld From ACM TechNews | March 12, 2009
Carnegie Mellon University professor Jeannette M. Wing is an expert on computational thinking, the discipline of applying computer science's problem-solving methods...Computerworld From ACM TechNews | March 10, 2009
Microsoft technical fellow Butler Lampson, Google chief Internet evangelist Vinton Cerf, and Qualcomm chairman Irwin Jacobs discussed the past, present, and potential...Stanford Report (CA) From ACM TechNews | March 9, 2009
San Jose Mercury News (CA)A digital humanities project that started at Stanford University is teaching computers how to analyze text and extract metaphors to build...The San Jose Mercury News From ACM TechNews | March 6, 2009
Government Computer NewsThe Ubiquitous Network Transient Autonomous Mission Entities (UNTAME) program at Oak Ridge National Laboratory is working to develop technology...Government Computer News From ACM TechNews | March 4, 2009
InfoWorldThe Internet's security problems could be corrected by exploiting existing standards and protocols for Web services, security, identity, and authentication...InfoWorld From ACM TechNews | March 4, 2009
NCSU NewsNorth Carolina State University (NCSU) computer security experts have developed Protection Poker, a new risk management tool that helps software developers...NCSU News From ACM TechNews | March 4, 2009
Dartmouth College's Institute for Information Infrastructure Protection (I3P) has given the U.S. Senate Committee on Homeland Security and Governmental Affairs...Dartmouth News From ACM TechNews | February 27, 2009
On the 40th anniversary of Douglas C. Engelbart's "The Mother of All Demos," computer scientists discuss the event's influence — and imagine what could have been...Karen A. Frenkel From Communications of the ACM | March 1, 2009
Virtualization is moving out of the data center and making inroads with mobile computing, security, and software delivery.Kirk L. Kroeker From Communications of the ACM | March 1, 2009
Researchers are turning to computers to help us take advantage of our own cognitive abilities and of the wisdom of crowds.Leah Hoffmann From Communications of the ACM | March 1, 2009
Rochester Institute of Technology (RIT) scientists are developing new optical sensors for use in unmanned air vehicles and surveillance drones that could track...Rochester Institute of Technology From ACM TechNews | February 23, 2009
The New York Times' recent article, "Do We Need a New Internet?," by John Markoff, has sparked debate in the research community over whether creating a secure Internet...CCC Blog From ACM TechNews | February 23, 2009
Beijing-based Venus Info Tech, a provider of IT network security to the Chinese military, has been accused of providing hacker services that help the Chinese government... From ACM News | February 23, 2009
Congressional Republicans have introduced the Internet Security Act, legislation in the U.S. House and Senate that would require Internet service providers (ISPs)...IDG News Service From ACM TechNews | February 23, 2009
Digital rights management (DRM) has emerged as a widespread tool to combat piracy. So far, however, DRM systems have proved highly inconvenient to consumers who...Samuel Greengard From ACM News | February 20, 2009
A security expert at the recent Black Hat DC computer security conference demonstrated a technique for attacking the Mac operating system OS X without leaving any...Technology Review From ACM TechNews | February 19, 2009