Rutgers University computer scientists are developing an alternative to online security questions that is designed to be easier for legitimate users and more secure...Rutgers niversity From ACM TechNews | November 10, 2009
Smart phones have become indispensable to today's highly mobile workforce and tech-savvy youngsters, but they pose new security and privacy risks. Two assistant...Georgia Institute of Technology From ACM News | November 10, 2009
The Advanced Encryption Standard (AES) system was long believed to be invulnerable to attack, but a group of researchers recently demonstrated that there may be...TechNewsWorld From ACM TechNews | November 9, 2009
The Clay Mathematics Institute has a standing offer of $1 million for anyone who is able to prove or disprove one of seven problems that have never been solved....MIT News From ACM TechNews | November 5, 2009
The intricate structure of the iris constitutes a powerful biometric. A new report from the National Institute of Standards and Technology (NIST) demonstrates that... National Institute of Standards and Technology From ACM News | November 5, 2009
Sharing small snippets of information about your daily life is a key feature of the online social networking revolution. Soon status updates and other social information... From ICT Results | November 4, 2009
Three cybersecurity experts recently told a meeting of the Congressional Cyber Caucus that current U.S. policies for protecting the United States against various...Computerworld From ACM TechNews | November 2, 2009
Massachusetts Institute of Technology researchers led by professor Martin Rinard have developed ClearView, software capable of finding and fixing certain types...Technology Review From ACM TechNews | November 2, 2009
Computer forensics researchers at the University of Alabama at Birmingham (UAB) have been tracking new spam that claims to come from the U.S. Federal Deposit Insurance...niversity of Alabama at Birmingham From ACM TechNews | October 29, 2009
Security researchers at Cryptography Research say the smart card attack involving differential power analysis could be used to target smartphones. Cryptography...Technology Review From ACM TechNews | October 27, 2009
Internationalized domain names (IDNs) will be one of the central topics at ICANN’s 36th International Public Meeting, which takes place October 25-30 in Seoul,...SA Today From ACM TechNews | October 27, 2009
A scan of the Internet by Columbia University researchers searching for vulnerable embedded devices has found that nearly 21,000 routers, Webcams, and VoIP products...Wired News From ACM TechNews | October 26, 2009
Internet security experts say that worms, spam, viruses and hackers could be well on their way into your smartphone, whose rising popularity makes them sweeter...CNN From ACM News | October 26, 2009
A new proposal from the Massachusetts Institute of Technology's (MIT's) Human Dynamics Laboratory suggests that digital identities would be more secure if they...New Scientist From ACM TechNews | October 23, 2009
A new study by researchers from the Massachusetts Institute of Technology (MIT) and the University of California, San Diego (UCSD) suggests that leading cloud-computing...Technology Review From ACM TechNews | October 23, 2009
University of Texas at Dallas (UTD) professor Bhavani Thuraisingham, director of UTD's CyberSecurity Research Center, believes it is possible to establish data...niversity of Texas at Dallas From ACM TechNews | October 22, 2009
The Expeditions in Computing program provides scientists with the funding to work on ambitious, often multidisciplinary research.Gregory Goth From Communications of the ACM | November 1, 2009
The first $1,000 Gordon Prize in Managing Cybersecurity Resources goes for an essay written by researchers from Harvard and Dresden, Germany. Maryland's Robert...niversity of Maryland, College Park From ACM News | October 20, 2009
Internet security experts have discovered that many phishers are using a trick called a flux, which allows a fake Web site to rapidly change its URL, making it... From ACM TechNews | October 19, 2009
The University of Science and Technology of China recently demonstrated a metropolitan quantum cryptography network (QCN) for use by the government in Wuhu, China...Science in China Press From ACM TechNews | October 19, 2009