Despite widespread speculation, nothing beyond what Steve Jobs announced last week is known about the A4 chip at the heart of the Apple iPad.
Jobs described the...Technology Review From ACM News | February 3, 2010
Today's stock market has become a world of automated transactions executed at lightning speed. This high-frequency trading could make the financial system more...Technology Review From ACM News | December 23, 2009
Researchers at IBM Thomas J. Watson Research Center and IBM Research-Zurich have developed a cloud computing security system that makes elements of the cloud act...Technology Review From ACM TechNews | November 20, 2009
Scientists at Microsoft research have unveiled Ripley, a new way to secure complex Web applications by effectively cloning the user's browser and running it remotely...Technology Review From ACM TechNews | November 10, 2009
Massachusetts Institute of Technology researchers led by professor Martin Rinard have developed ClearView, software capable of finding and fixing certain types...Technology Review From ACM TechNews | November 2, 2009
Security researchers at Cryptography Research say the smart card attack involving differential power analysis could be used to target smartphones. Cryptography...Technology Review From ACM TechNews | October 27, 2009
A new study by researchers from the Massachusetts Institute of Technology (MIT) and the University of California, San Diego (UCSD) suggests that leading cloud-computing...Technology Review From ACM TechNews | October 23, 2009
The way signal strength varies in a wireless network can reveal what's going on behind closed doors.
It's every schoolboy's dream: an easy way of looking through...Technology Review From ACM News | October 1, 2009
Google developed a new approach to mobile phone security with its open source Android operating system. Android developer Rich Cannings says there must be a balance...Technology Review From ACM TechNews | August 18, 2009
At the 9th annual Privacy Enhancing Technologies Symposium, security researchers discussed alternatives to existing systems designed to help Internet users maintain...Technology Review From ACM TechNews | August 13, 2009
Application programming interfaces (APIs), software specifications that allow Web sites and services to interact with each other, have been a major factor in the...Technology Review From ACM TechNews | August 7, 2009
Two programmers have hacked the World of Warcraft online game environment with a set of programs that automate in-game characters, which game developer Blizzard...Technology Review From ACM TechNews | August 6, 2009
A consortium that includes the Center for Strategic and International Studies, the SANS Institute, and the U.S. Department of Defense aims to cultivate a new generation...Technology Review From ACM TechNews | July 24, 2009
Indiana University researchers have exposed some of the methods spammers use to collect email addresses and send junk mail through multiple computers. In a paper...Technology Review From ACM TechNews | July 15, 2009
Juniper security researcher Barnaby Jack canceled plans for a live demonstration of the insecurity of automatic teller machines (ATMs) at the upcoming Black Hat...Technology Review From ACM TechNews | July 9, 2009
The "secret questions" that protect online accounts and passwords may be far less secure than commonly believed, largely because their answers are often far too...Technology Review From ACM TechNews | May 18, 2009
University of Illinois at Chicago (UIC) researchers will present a new way of defending against cross-site scripting attacks at the upcoming IEEE Symposium on Security...Technology Review From ACM TechNews | May 15, 2009
The massively parallel nature of DNA computing represents a significant threat to existing encryption schemes, but the technology also could be used to encrypt...Technology Review From ACM TechNews | March 24, 2009
A security expert at the recent Black Hat DC computer security conference demonstrated a technique for attacking the Mac operating system OS X without leaving any...Technology Review From ACM TechNews | February 19, 2009
A year after security researchers exposed a flaw in the Domain Name System (DNS), a permanent solution is finally being implemented. The DNSSEC protocol, which...Technology Review From ACM TechNews | January 7, 2009