The U.S. Intelligence Advanced Research Projects Activity has awarded Galois $1 million to make fully homomorphic encryption available to programmers.
Network World From ACM TechNews | May 17, 2017
The U.S. Intelligence Advanced Research Projects Activity's newest contest challenges participants to build an automated fingerprint collection system that matches...Network World From ACM TechNews | February 1, 2017
Researchers say they have developed a virtual reality-based cyberattack that can reproduce the human face well enough to trick face-authentication systems. Network World From ACM TechNews | August 24, 2016
Issues related to automobile cybersecurity are likely to increase, but U.S. auto cybersecurity standards are not expected until at least 2018. Network World From ACM TechNews | May 4, 2016
The U.S. Defense Advanced Research Projects Agency recently announced the $2-million Spectrum Collaboration Challenge.Network World From ACM TechNews | March 31, 2016
A panel of leading cryptographers at this week's RSA Conference agreed inserting backdoors to unscramble encrypted communications is a threat to confidentiality...Network World From ACM TechNews | March 4, 2016
Researchers from Ben-Gurion University in Israel have developed an algorithm that can trace botnets back to their perpetrators. Network World From ACM TechNews | February 10, 2016
A researcher charges the protocol created by a U.K. governmental group to encrypt voice calls has a weakness built into it by design that could enable mass surveillance...Network World From ACM TechNews | January 22, 2016
The U.S. Defense Advanced Research Projects Agency wants to develop an easy-to-use toolset to detect altered images.Network World From ACM TechNews | October 26, 2015
U.S. Defense Advanced Research Projects Agency researchers are working on a program that aims to solve critical wireless technology problems. Network World From ACM TechNews | October 20, 2015
Researchers at Jeppiaar Engineering College in Chennai, India, have developed a biometric keystroke algorithm that learns how the user types.Network World From ACM TechNews | October 6, 2015
Stanford University professor Dan Boneh's contributions to cryptography have earned him the 2014 ACM-Infosys Foundation Award in Computing Sciences.Network World From ACM TechNews | April 1, 2015
Cybersecurity job postings grew 74 percent from 2007 to 2013, more than twice the rate of all information technology jobs, according to a Burning Glass study. Network World From ACM TechNews | March 11, 2015
The U.S. Intelligence Advanced Research Projects Activity is doing research for its Future Applications of Sense Technology for Fidelitous Wearable Devices program...Network World From ACM TechNews | December 8, 2014
The U.S. Defense Advanced Research Projects Agency wants to improve networking and security at the wide area network edge.Network World From ACM TechNews | November 18, 2014
Sir Tim Berners-Lee is using the 25th anniversary of his invention of the World Wide Web to push for an Internet bill of rights.Network World From ACM TechNews | October 1, 2014
Security researchers with permission from local road authorities hacked into nearly 100 wirelessly networked traffic lights and were able to change the lights on...Network World From ACM TechNews | August 25, 2014
Carnegie Mellon University researchers have developed GOTCHA, Generating panOptic Turing Tests to Tell Computers and Humans Apart, a password system based on visual...Network World From ACM TechNews | November 8, 2013
The standards organization Open Group has created a standard for modeling security dependencies. The "Dependency Modeling Standard" will enable the military and...Network World From ACM TechNews | December 18, 2012
DARPA's Vetting Commodity IT Software and Firmware program aims to develop systems that can verify the security of commercial IT devices. Network World From ACM TechNews | December 5, 2012