Like a ghost ship, a rogue software program that glided onto the Internet last November has confounded the efforts of top security experts to eradicate the program...The New York Times From ACM News | August 27, 2009
Opinions expressed on the Internet can determine the eventual success or failure of a product, and tools stemming from the emergent field of sentiment analysis...The New York Times From ACM TechNews | August 24, 2009
At the core of the U.S. Obama Administration and its Pentagon leadership's efforts to develop rules governing cyberwarfare is the question of whether offensive...The New York Times From ACM TechNews | August 3, 2009
To track the spread of botnets, Sandia National Laboratories computer security specialists Rob Minnich and Don Rudish have converted a Dell Thunderbird supercomputer...The New York Times From ACM TechNews | July 29, 2009
Much of the daily material of our lives is now dematerialized and outsourced to a far-flung, unseen network. The stack of letters becomes the e-mail database on...The New York Times From ACM News | June 11, 2009
It is an interesting twist about Wikipedia that the most controversial, most heavily trafficked articles — on abortion, politics, virgin birth — are often the most...The New York Times From ACM News | June 8, 2009
U.S. President Barack Obama announced that the country's disjointed efforts to "deter, prevent, detect, and defend" against cyberattacks will now be run by the...The New York Times From ACM TechNews | June 1, 2009
The U.S. Pentagon is planning to establish a new cyberwarfare command as a complement to a soon-to-be-announced civilian computer network safety overhaul, according...The New York Times From ACM TechNews | May 29, 2009
The Internet is rife with cybercriminals and online eavesdroppers, and countering this threat is the job of cybersleuths. One of the key tools in cybersleuths'...The New York Times From ACM TechNews | May 13, 2009
A lost or stolen laptop or notebook computer is replaceable; the stolen data inside it may produce real owner's anxiety. Which makes Fujitsu's newly announced "security...The New York Times From ACM News | May 13, 2009
Throughout the U.S. military there is heightened awareness that the threat of a computer attack is just as urgent as a physical attack, and that military units...The New York Times From ACM TechNews | May 11, 2009
Sometimes a technology comes along and crystallizes a cultural moment. Not since the automobile and the American in the 1950s, perhaps, have a technology and a...The New York Times From ACM News | May 8, 2009
People around the world are circumventing their governments' censorship of Web content using tools developed and provided by a diverse coalition of political and...The New York Times From ACM TechNews | May 1, 2009
A report based on a three-year study by a panel assembled by the National Academy of Sciences says the United States does not have a clear military policy on how...The New York Times From ACM TechNews | May 1, 2009
Low-cost sensors, clever software, and computing firepower are key ingredients of an emerging computing trend called smart infrastructure — efficient and environmentally...The New York Times From ACM News | April 30, 2009
The United States is engaged in an international race to develop both cyberweapons and cyberdefenses. Thousands of daily attacks on federal and private computer...The New York Times From ACM TechNews | April 29, 2009
Europe's influence over technology regulation has led U.S. companies to send lobbyists to try and influence European lawmakers as they debate Internet access policy...The New York Times From ACM TechNews | March 9, 2009
Although some countries have far more broadband-connected homes and higher broadband speeds than the United States, the U.S. leads the world in putting broadband...The New York Times From ACM TechNews | February 27, 2009
There is a growing belief among engineers and security experts that the only way to fix Internet security is to recreate the Internet from scratch. What a new...The New York Times From ACM TechNews | February 18, 2009