Major corporations have made serious mistakes with information security recently, resulting in spectacular failures to protect business and customer records....Technology Review From ACM News | June 3, 2011
Recent weeks have been exciting for a relatively new kind of currency speculator. In just three weeks, the total value of a unique new digital currency called...Technology Review From ACM News | May 27, 2011
Third-party apps are the weakest link in user privacy on smart phones. They often get access to large quantities of user data, and there are few rules covering...Technology Review From ACM News | May 23, 2011
Media, search engines, advertisers and social networks have been tracking what you click since the birth of the Web, but this measurement yields an incomplete...Technology Review From ACM News | May 20, 2011
Two major cloud computing services, Amazon's Elastic Compute Cloud and Sony's PlayStation Network, recently suffered extended outages. Though the circumstances...Technology Review From ACM News | May 4, 2011
University of California, San Diego researchers working on the GreenDroid project have developed software that scans the Android operating system and its most popular...Technology Review From ACM TechNews | April 29, 2011
Microsoft researchers have developed RePriv, a browser that analyzes users' online behavior and controls how their personal information is released to sites that...Technology Review From ACM TechNews | April 21, 2011
They're the scourge of the Internet—networks containing thousands or even millions of virus-infected, remote-controlled PCs. These so-called "botnets" send out...Technology Review From ACM News | April 13, 2011
Google may be built on an algorithm for taming the Web, but yesterday the company added social features that will let your friends help determine what ranks high...Technology Review From ACM News | April 1, 2011
Researchers who have spent the last two years studying the security of car computer systems have revealed that they can take control of vehicles wirelessly.Technology Review From ACM News | March 14, 2011
Handing sensitive data over to a cloud computing provider makes many companies skittish. But new software, called HomeAlone, could help them come to terms with...Technology Review From ACM News | March 11, 2011
At the Shmoocon conference, researchers demonstrated how hackers are using printers to infiltrate corporate computer networks. Printers are "totally integrated...Technology Review From ACM TechNews | January 24, 2011
A method for breaking into and stealing cars that have keyless entry and starting systems has been found by ETH Zurich researchers, who were able to gain entry...Technology Review From ACM TechNews | January 6, 2011
Low-end mobile phones are vulnerable to hackers using short message service (SMS) communications, according to research presented at a recent conference in Germany...Technology Review From ACM TechNews | January 5, 2011
How the inventor of the PalmPilot studied the workings of the human brain to help companies turn a deluge of data into business intelligence.Technology Review From ACM News | December 21, 2010
Researchers created their own, imprisoned, network of zombie computers to better learn how to take down those at large on the Internet.Technology Review From ACM News | December 17, 2010
A new technique from Microsoft Research Silicon Valley could be used to target advertising to users' surroundings without their knowledge.Technology Review From ACM News | December 17, 2010