University of Southern California scientists have developed a machine-translation technique that treats translation as a cryptographic challenge rather than a matter...New Scientist From ACM TechNews | June 24, 2011
Delft University researchers are studying how botclouds can be used to launch attacks, send spam, and commit fraud. New Scientist From ACM TechNews | June 23, 2011
The peculiar list of search options that Google suggests as you type in a query could be hijacked to let people communicate secretly.New Scientist From ACM News | June 22, 2011
A gender analysis program developed by Stevens Institute of Technology researcher Na Cheng could have determined the sex of a 40-year-old U.S. man writing online...New Scientist From ACM TechNews | June 20, 2011
In a quiet, windowless auditorium in Bristol, in the west of England, Lucy Robson and her team hunch over their laptops as the seconds on a giant clock above...New Scientist From ACM News | June 8, 2011
Good news for spies. There is now a way to hide data on a hard drive without using encryption. Instead of using a cipher to scramble text, the method involves...New Scientist From ACM News | April 21, 2011
Stealthy radar systems and the ability to transmit large amounts of data over long distances are a step closer thanks to a technique that could improve the efficiency...New Scientist From ACM News | April 5, 2011
In A bar in Maastricht University in the Netherlands, 12 students are each given an envelope marked "Top Secret." Inside are plans for a terror attack somewhere...New Scientist From ACM News | March 15, 2011
Signals from GPS satellites now help you to call your mother, power your home, and even land your plane – but a cheap plastic box can jam it all.New Scientist From ACM News | March 10, 2011
Picture the scene: armed police officers are warned on their radios that a suspected male terrorist has been tracked to a crowded football stadium.New Scientist From ACM News | February 24, 2011
University of Minnesota researchers have developed a cyberweapon that turns the structure of the Internet against itself, but ultimately could be used to make the...New Scientist From ACM TechNews | February 14, 2011
The U.S. National Institute of Standards and Technology has selected five Secure Hash Algorithm (SHA-3) entrants as finalists for its competition to find a replacement...New Scientist From ACM TechNews | December 15, 2010
A competition to find a replacement for one of the gold-standard computer security algorithms used in almost all secure, online transactions just heated up.New Scientist From ACM News | December 15, 2010
Stuxnet is the first worm of its type capable of attacking critical infrastructure like power stations and electricity grids: those in the know have been expecting...New Scientist From ACM News | September 28, 2010
His prospects of answering one of the biggest questions in mathematics may be fading, but Vinay Deolalikar of Hewlett-Packard Labs in Palo Alto, California, may...New Scientist From ACM News | August 20, 2010
Life is about to become more difficult for countries trying to censor access to foreign Websites. A system dubbed Collage will allow users in these countries...New Scientist From ACM News | August 13, 2010
Has the biggest question in computer science been solved? On 6 August, Vinay Deolalikar, a mathematician at Hewlett-Packard Labs in Palo Alto, California, sentdraft...New Scientist From ACM News | August 11, 2010
Every move you make, every twitter feed you update, somebody is watching you. You may not think twice about it, but if you use a social networking site, a cellphone...New Scientist From ACM News | July 26, 2010