count likely knows that police can peek inside it if they have a paper search warrant.
But cybercrime investigators are frustrated by the speed of traditionalone...CNET From ACM News | February 3, 2010
The China-U.S. diplomatic spat over cyberattacks on Google has highlighted the growing significance of the Internet as a theater of combat.
Deputy Defense Secretary...Time From ACM News | February 3, 2010
Despite widespread speculation, nothing beyond what Steve Jobs announced last week is known about the A4 chip at the heart of the Apple iPad.
Jobs described the...Technology Review From ACM News | February 3, 2010
Cyber attacks are becoming the bane of governments and companies alike. A Virginia based engineering research company may have the answer. InZero Systems has developed...The New New Internet From ACM News | February 3, 2010
Iowa investigators suspect a serious breach of a state government computer database last week originated in China. The hackers gained access to a computer system...The Des Moines Register From ACM News | February 3, 2010
For a company that makes no products, Acacia Research spends a lot of time fighting over patents in court. Acacia has filed at least 337 patent-related lawsuits...BusinessWeek From ACM News | February 2, 2010
The recent hacking attack that prompted Google's threat to leave China is underscoring the heightened dangers of previously undisclosed computer security flaws...The Associated Press From ACM News | February 2, 2010
With a few quick keystrokes, a computer hacker who goes by the code name Majia calls up a screen displaying his latest victims. He operates secretly and illegally...The New York Times From ACM News | February 2, 2010
Being hacked by a robot requires much less hardware than I expected. There’s no need for virtual-reality goggles or 3D holograms. There are no skullcaps studded...Popular Mechanics From ACM News | February 1, 2010
The Fraunhofer Institute for Secure Information Technology (SIT) in Germany has developed VoIPS, software that prevents the tampering and manipulation of telephone...Fraunhofer-Gesellschaft From ACM TechNews | February 1, 2010
A Chinese military expert Sunday (January 31) refuted claims by the U.K.'s national security intelligence agency that China has engaged in commercial espionage,...Global Times From ACM News | February 1, 2010
In computing, the vision always precedes the reality by a decade or more. The pattern has held true from the personal computer to the Internet, as it takes time...The New York Times From ACM News | February 1, 2010
In the U.S. Naval Network Warfare Command, the largest threats against U.S. computer networks originate from Chinese hackers. According to a report from Federal...The Epoch Times From ACM News | February 1, 2010
Pico Computing announced that it has achieved the highest-known benchmark speeds for 56-bit DES decryption, with reported throughput of over 280 billion keys per...Pico Computing From ACM News | February 1, 2010
University of Cambridge Computer Laboratory researchers Steven J. Murdoch and Ross Anderson contend in a paper that the 3D Secure credit card authentication system...Heise Online (nited Kingdom) From ACM TechNews | January 29, 2010
Think that turning off cookies and turning on private browsing makes you invisible on the web? Think again.
The Electronic Frontier Foundation (EFF) has launched...WebMonkey From ACM News | January 28, 2010
An innovative computational technique that draws on statistics, imaging, and other disciplines has the capability to detect errors in sensitive technological systems...niversity Corporation for Atmospheric Research From ACM News | January 28, 2010
The staggering cost and impact of cyber attacks on critical infrastructure such as electrical grids, oil and gas production, telecommunications and transportation...McAfee Inc. From ACM News | January 28, 2010
Researchers from the International Computer Science Institute and the University of California, San Diego have developed a method for blocking the most common type...New Scientist From ACM TechNews | January 27, 2010
U.S. businesses and government agencies are facing increasing risks of potential cyber attacks from China, according to a recent report. And IT departments that...Insurance Journal From ACM News | January 27, 2010