It is an interesting twist about Wikipedia that the most controversial, most heavily trafficked articles — on abortion, politics, virgin birth — are often the most...The New York Times From ACM News | June 8, 2009
U.S. President Barack Obama announced that the country's disjointed efforts to "deter, prevent, detect, and defend" against cyberattacks will now be run by the...The New York Times From ACM TechNews | June 1, 2009
The U.S. Pentagon is planning to establish a new cyberwarfare command as a complement to a soon-to-be-announced civilian computer network safety overhaul, according...The New York Times From ACM TechNews | May 29, 2009
The Internet is rife with cybercriminals and online eavesdroppers, and countering this threat is the job of cybersleuths. One of the key tools in cybersleuths'...The New York Times From ACM TechNews | May 13, 2009
A lost or stolen laptop or notebook computer is replaceable; the stolen data inside it may produce real owner's anxiety. Which makes Fujitsu's newly announced "security...The New York Times From ACM News | May 13, 2009
Throughout the U.S. military there is heightened awareness that the threat of a computer attack is just as urgent as a physical attack, and that military units...The New York Times From ACM TechNews | May 11, 2009
Sometimes a technology comes along and crystallizes a cultural moment. Not since the automobile and the American in the 1950s, perhaps, have a technology and a...The New York Times From ACM News | May 8, 2009
People around the world are circumventing their governments' censorship of Web content using tools developed and provided by a diverse coalition of political and...The New York Times From ACM TechNews | May 1, 2009
A report based on a three-year study by a panel assembled by the National Academy of Sciences says the United States does not have a clear military policy on how...The New York Times From ACM TechNews | May 1, 2009
Low-cost sensors, clever software, and computing firepower are key ingredients of an emerging computing trend called smart infrastructure — efficient and environmentally...The New York Times From ACM News | April 30, 2009
The United States is engaged in an international race to develop both cyberweapons and cyberdefenses. Thousands of daily attacks on federal and private computer...The New York Times From ACM TechNews | April 29, 2009
Europe's influence over technology regulation has led U.S. companies to send lobbyists to try and influence European lawmakers as they debate Internet access policy...The New York Times From ACM TechNews | March 9, 2009
Although some countries have far more broadband-connected homes and higher broadband speeds than the United States, the U.S. leads the world in putting broadband...The New York Times From ACM TechNews | February 27, 2009
There is a growing belief among engineers and security experts that the only way to fix Internet security is to recreate the Internet from scratch. What a new...The New York Times From ACM TechNews | February 18, 2009