University of Colorado at Colorado Springs researchers have developed Vaulted Voice Verification, an approach to voice identification that can be used for voice...Technology Review From ACM TechNews | December 7, 2012
Cloud computing teaches people not to worry about physical equipment for hosting data and running software.Technology Review From ACM News | November 16, 2012
The lack of verifiable security in online voting systems due to unresolved fundamental problems is the main reason such systems are impractical, according to computer...Technology Review From ACM TechNews | November 7, 2012
A decade and a half into the Web revolution, we do much of our banking and shopping online. So why can't we vote over the Internet? The answer is that voting presents...Technology Review From ACM News | November 5, 2012
Next Tuesday's presidential election will likely be extremely close, magnifying the potential impact of vote-counting errors.Technology Review From ACM News | November 2, 2012
The U.S. government's retaliatory capability in response to cyberattacks on critical infrastructure is limited by a dearth of technology. Technology Review From ACM TechNews | October 23, 2012
Computerized hospital equipment is increasingly vulnerable to malware infections, according to participants in a recent government panel. These infections can clog...Technology Review From ACM News | October 18, 2012
The idea of a network of malware-infected zombie computers rigged to do the bidding of criminals conjures up a frightening image on its own. A new visualization...Technology Review From ACM News | October 16, 2012
RSA researchers have developed a system that splits passwords in two and stores each half in different locations. Technology Review From ACM TechNews | October 9, 2012
Security researchers warn that the techniques used in sophisticated, state-supported malware are being used by less-skilled programmers to target Web users. Technology Review From ACM TechNews | September 25, 2012
Malicious code apparently used by governments to spy on, harass, and sabotage one another has grabbed headlines in recent years, yet the highly targeted nature...Technology Review From ACM News | September 19, 2012
Rutgers University researchers have developed a device that could identify an individual user and rapidly switch a system's settings to adjust to the user, providing...Technology Review From ACM TechNews | August 31, 2012
Pleasing the crowd at the Black Hat and Def Con computer security conferences that took place in Las Vegas last week is relatively easy: simply hop on stage and...Technology Review From ACM News | August 3, 2012
French hacker Jonathan Brossard recently developed Rakshasa, software that can be hidden inside the hardware of a PC, creating a backdoor that would allow secret...Technology Review From ACM TechNews | August 2, 2012
The U.S. Internet's infrastructure needs to be redesigned to allow the NSA to know instantly when overseas hackers might be attacking public or private infrastructure...Technology Review From ACM News | July 31, 2012
Weaknesses in the technology that allows smartphone users to pinpoint themselves on a map, or check into restaurants and bars using apps such as Foursquare, could...Technology Review From ACM News | July 27, 2012
Georgia Tech's Paul Royal has shown that a newly refined technique could make automated analysis of malware nearly impossible, and he plans to reveal his work at...Technology Review From ACM TechNews | July 26, 2012
If Facebook were a country, a conceit that founder Mark Zuckerberg has entertained in public, its 900 million members would make it the third largest in the world...Technology Review From ACM News | June 14, 2012
Two weeks ago today, computer security labs in Iran, Russia, and Hungary announced the discovery of Flame, "the most complex malware ever found," according to Hungary's...Technology Review From ACM News | June 12, 2012