The computers of Tibetan exiles and the U.S. electrical grid were recently breached by hackers, highlighting the growing threat of cyber espionage. The White House...The Associated Press From ACM TechNews | April 13, 2009
The University of Sunderland's Computerized Analysis of Stocks and Shares for Novelty Detection of Radical Activities (CASSANDRA) project is developing a software...The niversity of Sunderland From ACM TechNews | April 13, 2009
Electronic components continue to be made smaller and smaller, which reduces the amount of power that they require but increases signal-to-noise ratios. If electronic...Fraunhofer Institute From ACM TechNews | April 8, 2009
Purdue University and Rutgers University will lead an international research and education group in a six-year, $30 million U.S. Department of Homeland Security...Purdue niversity News From ACM TechNews | April 6, 2009
Tel Aviv University researchers have developed Smart Dew, tiny sensors as small as dewdrops that can be arranged in a network. The inexpensive sensors are equipped...American Friends of Tel Aviv niversity From ACM TechNews | April 1, 2009
An informal group of computer security experts said they have observed early attempts by the Conficker virus to communicate with a control server, but they are...The New York Times From ACM TechNews | April 1, 2009
Although many sectors of the economy are struggling to survive, the information technology (IT) industry is still relatively strong. Employment experts say that...Network World From ACM TechNews | March 31, 2009
The EuroSys 2009 conference, sponsored by the European chapter of ACM's Special Interest Group on Operating Systems, will focus on computer system research that...ACM From ACM TechNews | March 30, 2009
A 34-year-old student and part-time tech geek at Toronto's Munk Centre for International Studies tried everything to track down a piece of malicious software that...Simple Thoughts From ACM News | March 31, 2009
Canadian researchers have reportedly uncovered a Chinese cyber plot that hacked the Web sites of the Tibetan spiritual leader, the Dalai Lama, and systems in the... From ACM News | March 30, 2009
Concerned over the growing number of cyber crime cases in its country, the Indian Government on Thursday (March 26) said that an international crisis management...Harama Photos From ACM News | March 26, 2009
The Scholarship for Service (SFS) program, jointly run by the National Science Foundation and the U.S. Department of Homeland Security (DHS), is becoming a widely...Government Computer News From ACM TechNews | March 25, 2009
The massively parallel nature of DNA computing represents a significant threat to existing encryption schemes, but the technology also could be used to encrypt...Technology Review From ACM TechNews | March 24, 2009
Sixteen-year-old Sahil Khan calls himself a hacker, not a cracker, a distinction that puts him on the ethical side of computer security. A "cracker" is a cyber...IslamOnline.net From ACM News | March 24, 2009
The 2009 Richard Tapia Celebration of Diversity in Computer Conference will feature papers, panels, workshops, poster sessions, Birds-of-a-Feather meetings, a doctoral...HPC Wire From ACM TechNews | March 23, 2009
China-based hackers breached the office computers of Democratic Sen. Bill Nelson of Florida, the senator's office confirmed March 20. In three separate attacks,...CQ Politics From ACM News | March 23, 2009
Scientists from the National Institute of Standards and Technology (NIST) are developing standards, guidance, and testing procedures designed to improve the security...NIST Tech Beat From ACM TechNews | March 20, 2009
Research teams from the Ecole Polytechnique Federale de Lausanne in Switzerland and Inverse Path say they have discovered new techniques to read what a person is...IDG News Service From ACM TechNews | March 19, 2009
An early warning system on the Internet could help Europe avoid deliberate or accidental outages, restrict the spread of new viruses, and ensure reliable services...Science Daily From ACM TechNews | March 18, 2009
Distributed denial of service (DDOS) attacks are now being used by governments as another way to counter opposition, warns Arbor Networks senior security researcher...IDG News Service From ACM TechNews | March 17, 2009