A chilling demonstration to a small, packed room at the recent RSA security conference showed how clicking a single bad Web link while using a phone running Google's...Technology Review From ACM News | March 8, 2012
Cryptography Research scientists have developed a method for a standard TV antenna, an amplifier, and specialized software to find the secret key being used by...Technology Review From ACM TechNews | March 8, 2012
A chilling demonstration to a small, packed room at the RSA security conference showed how clicking a single bad Web link while using a phone running Google's Android...Technology Review From ACM News | March 2, 2012
The U.S. Department of Defense may have funded the research that led to the Internet, but freewheeling innovation created the patchwork of privately owned technology...Technology Review From ACM News | March 1, 2012
On 6 May 2010, shares on U.S. financial markets suddenly dropped on average by around 10% but in over 300 stocks by more than 60%. Moments later the prices recovered...Technology Review From ACM News | February 16, 2012
Tiffany Rad got interested in hacking cars because she wanted to drive her Land Rover off-road on rugged terrain without worrying about setting off the air bags...Technology Review From ACM News | January 31, 2012
The perfect secrecy offered by quantum mechanics appears to have been scuppered by a previously unknown practical problem, say physicists.Technology Review From ACM News | January 26, 2012
Marina Jeaneth Machicao and colleagues at the University of San Paul in Brazil are using chaos to encrypt images. Their approach generates a pseudo-random signal...Technology Review From ACM TechNews | January 6, 2012
Military bureaucracies around the world are likely to see offensive capabilities as increasingly attractive in any cyberwar, suggests the head of the computer...Technology Review From ACM News | December 19, 2011
In recent months, I've met at least three people who have been the victim of hackers who've taken over their Gmail accounts and sent out emails to everyone in...Technology Review From ACM News | December 15, 2011
Documents point to a huge industry that provides online surveillance tools to governments and police agencies.Technology Review From ACM News | December 13, 2011
How will users hack this one? The Kinect is a device that inherently grows and expands: Microsoft itself has come around to acknowledging that the oft-hackedreally...Technology Review From ACM News | December 8, 2011
"Carrier IQ" is a company that sells software to wireless companies that reports how well networks are performing in real-time, by sending performance data from...Technology Review From ACM News | December 5, 2011
A consortium providing the technology for a large-scale smart grid project says the software is nearly complete. Technology Review From ACM TechNews | October 28, 2011
The buzz starts low and quickly gets louder as a toy quadricopter flies in low over the buildings. It might look like flight enthusiasts having fun, but it could...Technology Review From ACM News | September 9, 2011
Researchers hope a new system could automatically scan the hours of CCTV footage police have to comb through to identify suspects without invading privacy.Technology Review From ACM News | August 31, 2011
Researchers have developed a laptop-sized device that emits a jamming signal whenever it detects an unauthorized wireless link being established between a medical...Technology Review From ACM TechNews | August 25, 2011
Microsoft researchers have developed a prototype data security system designed to ensure that information can only escape in an encrypted form that would be nearly...Technology Review From ACM TechNews | August 8, 2011
Ever since Google announced that its Android phones would be equipped with a "digital wallet" that allows users to pay for things simply by touching their phone...Technology Review From ACM News | August 5, 2011