At the 9th annual Privacy Enhancing Technologies Symposium, security researchers discussed alternatives to existing systems designed to help Internet users maintain...Technology Review From ACM TechNews | August 13, 2009
Application programming interfaces (APIs), software specifications that allow Web sites and services to interact with each other, have been a major factor in the...Technology Review From ACM TechNews | August 7, 2009
Two programmers have hacked the World of Warcraft online game environment with a set of programs that automate in-game characters, which game developer Blizzard...Technology Review From ACM TechNews | August 6, 2009
A consortium that includes the Center for Strategic and International Studies, the SANS Institute, and the U.S. Department of Defense aims to cultivate a new generation...Technology Review From ACM TechNews | July 24, 2009
Indiana University researchers have exposed some of the methods spammers use to collect email addresses and send junk mail through multiple computers. In a paper...Technology Review From ACM TechNews | July 15, 2009
Juniper security researcher Barnaby Jack canceled plans for a live demonstration of the insecurity of automatic teller machines (ATMs) at the upcoming Black Hat...Technology Review From ACM TechNews | July 9, 2009
The "secret questions" that protect online accounts and passwords may be far less secure than commonly believed, largely because their answers are often far too...Technology Review From ACM TechNews | May 18, 2009
University of Illinois at Chicago (UIC) researchers will present a new way of defending against cross-site scripting attacks at the upcoming IEEE Symposium on Security...Technology Review From ACM TechNews | May 15, 2009
The massively parallel nature of DNA computing represents a significant threat to existing encryption schemes, but the technology also could be used to encrypt...Technology Review From ACM TechNews | March 24, 2009
A security expert at the recent Black Hat DC computer security conference demonstrated a technique for attacking the Mac operating system OS X without leaving any...Technology Review From ACM TechNews | February 19, 2009
A year after security researchers exposed a flaw in the Domain Name System (DNS), a permanent solution is finally being implemented. The DNSSEC protocol, which...Technology Review From ACM TechNews | January 7, 2009