The Internet Bug Bounty program recently paid $10,000 each to a pair of security researchers for vulnerabilities they found in Flash. Computerworld From ACM TechNews | March 26, 2014
Rensselaer Polytechnic Institute professor Selmer Bringsjord says understanding morality is increasingly important as robots become smarter and more autonomous. ...Computerworld From ACM TechNews | March 14, 2014
Aviation experts have cited multiple possible reasons for the problems in the multi-country effort to locate the Malaysia Airlines jetliner that dropped off the...Computerworld From ACM News | March 12, 2014
Former U.S. Secretary of Defense Leon Panetta said a large-scale cyberattack against U.S. infrastructure is "the most serious threat in the 21st century." Computerworld From ACM TechNews | March 12, 2014
A new paper shows how integrated circuits used in computers, military equipment, and other critical systems can be compromised during the manufacturing process. ...Computerworld From ACM TechNews | September 20, 2013
Hewlett-Packard Tipping Point's bug bounty program will sponsor the second annual Mobile Pwn2Own contest this fall. Computerworld From ACM TechNews | September 17, 2013
Inventor and futurist Ray Kurzweil says human brains will one day extend into the cloud, and it will be possible to selectively erase pieces of memory while keeping...Computerworld From ACM TechNews | October 11, 2012
Google announced that it will pay up to $2 million for the discovery of major vulnerabilities in the Chrome browser at the Pwnium hacking contest. Computerworld From ACM TechNews | August 21, 2012
Microsoft announced that each of the three finalists in its $250,000 BlueHat Prize security contest came up with different solutions for blocking return-oriented...Computerworld From ACM TechNews | June 25, 2012
A large portion of the Duqu Trojan was written in an unusual programming language, according to malware experts at Kaspersky Lab. Computerworld From ACM TechNews | March 13, 2012
An online encryption technique widely used to safeguard email, e-commerce, and other sensitive Internet transactions is crackable, according to a study by U.S....Computerworld From ACM TechNews | February 15, 2012
Governance of the Internet is a critical issue for the high-tech world, says Internet pioneer Vint Cerf.Computerworld From ACM TechNews | November 15, 2011
Argonne National Laboratory researchers recently demonstrated how the Diebold Accuvote TS machine can be hacked using inexpensive, widely available electronic...Computerworld From ACM TechNews | September 30, 2011
Catastrophic cyberattacks are a very real threat to U.S. security, according to a study from the Bipartisan Policy Center's National Security Preparedness Group...Computerworld From ACM TechNews | September 9, 2011
Security researchers Mike Tassey and Richard Perkins recently unveiled the Wi-Fi Aerial Surveillance Platform, a remote controlled unmanned aerial vehicle that...Computerworld From ACM TechNews | August 9, 2011
A new and improved botnet that has infected more than four million PCs is "practically indestructible," security researchers say. "TDL-4," the name for both the...Computerworld From ACM News | June 30, 2011
Over the next 20 years, the potential of quantum computing could lead to a development boom in chip and hardware design similar to what Silicon Valley experienced...Computerworld From ACM TechNews | June 17, 2011
The absence of Internet and telephone service at Osama bin Laden's $1 million hiding place helped tip off intelligence experts that the Al Qaeda leader was indeed...Computerworld From ACM News | May 2, 2011