Malicious code apparently used by governments to spy on, harass, and sabotage one another has grabbed headlines in recent years, yet the highly targeted nature...Technology Review From ACM News | September 19, 2012
Rutgers University researchers have developed a device that could identify an individual user and rapidly switch a system's settings to adjust to the user, providing...Technology Review From ACM TechNews | August 31, 2012
Pleasing the crowd at the Black Hat and Def Con computer security conferences that took place in Las Vegas last week is relatively easy: simply hop on stage and...Technology Review From ACM News | August 3, 2012
French hacker Jonathan Brossard recently developed Rakshasa, software that can be hidden inside the hardware of a PC, creating a backdoor that would allow secret...Technology Review From ACM TechNews | August 2, 2012
The U.S. Internet's infrastructure needs to be redesigned to allow the NSA to know instantly when overseas hackers might be attacking public or private infrastructure...Technology Review From ACM News | July 31, 2012
Weaknesses in the technology that allows smartphone users to pinpoint themselves on a map, or check into restaurants and bars using apps such as Foursquare, could...Technology Review From ACM News | July 27, 2012
Georgia Tech's Paul Royal has shown that a newly refined technique could make automated analysis of malware nearly impossible, and he plans to reveal his work at...Technology Review From ACM TechNews | July 26, 2012
If Facebook were a country, a conceit that founder Mark Zuckerberg has entertained in public, its 900 million members would make it the third largest in the world...Technology Review From ACM News | June 14, 2012
Two weeks ago today, computer security labs in Iran, Russia, and Hungary announced the discovery of Flame, "the most complex malware ever found," according to Hungary's...Technology Review From ACM News | June 12, 2012
The Tor Project is a free network run by volunteers that hides users locations and usage from surveillance and traffic analysis.Technology Review From ACM News | April 4, 2012
A chilling demonstration to a small, packed room at the recent RSA security conference showed how clicking a single bad Web link while using a phone running Google's...Technology Review From ACM News | March 8, 2012
Cryptography Research scientists have developed a method for a standard TV antenna, an amplifier, and specialized software to find the secret key being used by...Technology Review From ACM TechNews | March 8, 2012
A chilling demonstration to a small, packed room at the RSA security conference showed how clicking a single bad Web link while using a phone running Google's Android...Technology Review From ACM News | March 2, 2012
The U.S. Department of Defense may have funded the research that led to the Internet, but freewheeling innovation created the patchwork of privately owned technology...Technology Review From ACM News | March 1, 2012
On 6 May 2010, shares on U.S. financial markets suddenly dropped on average by around 10% but in over 300 stocks by more than 60%. Moments later the prices recovered...Technology Review From ACM News | February 16, 2012
Tiffany Rad got interested in hacking cars because she wanted to drive her Land Rover off-road on rugged terrain without worrying about setting off the air bags...Technology Review From ACM News | January 31, 2012
The perfect secrecy offered by quantum mechanics appears to have been scuppered by a previously unknown practical problem, say physicists.Technology Review From ACM News | January 26, 2012
Marina Jeaneth Machicao and colleagues at the University of San Paul in Brazil are using chaos to encrypt images. Their approach generates a pseudo-random signal...Technology Review From ACM TechNews | January 6, 2012
Military bureaucracies around the world are likely to see offensive capabilities as increasingly attractive in any cyberwar, suggests the head of the computer...Technology Review From ACM News | December 19, 2011
In recent months, I've met at least three people who have been the victim of hackers who've taken over their Gmail accounts and sent out emails to everyone in...Technology Review From ACM News | December 15, 2011