The United States should decide on rules for attacking other nations' networks in advance of an actual cyberwar, which could include an international agreement...CNET From ACM News | July 30, 2010
The Obama administration is seeking to make it easier for the FBI to compel companies to turn over records of an individual's Internet activity without a court...The Washington Post From ACM News | July 29, 2010
In a city filled with slot machines spilling jackpots, it was a "jackpotted" ATM machine that got the most attention Wednesday at the Black Hat security conference...Wired From ACM News | July 29, 2010
Attorney General Eric Holder's new probe into Wikileaks's posting of 91,000 war documents will likely find that tracing the path of the documents back through the...Technology Review From ACM News | July 29, 2010
Apple likes to maintain tight control over what programs can appear on the iPhone—a task that just became a little bit harder.The New York Times From ACM News | July 27, 2010
WikiLeaks isn't much to look at. The Website's homepage is largely composed of a plain-text logo and a giant hyperlink that simply says: "Submit documents."CNN From ACM News | July 26, 2010
Julian Assange has been hailed as a hero of investigative journalism and condemned as a risk to national security. Wikileaks, the site of which he is director,...The Financial Times From ACM News | July 26, 2010
The PLATO@50 Conference marked the semicentennial of the computer system that was the forerunner of today's social media and interactive education.Kirk L. Kroeker From Communications of the ACM | August 1, 2010
Data captured by sensors worn on the human body and analyzed in near real-time could transform our understanding of human behavior, health, and society.Sarah Underwood From Communications of the ACM | August 1, 2010
Wal-Mart Stores Inc. plans to roll out sophisticated electronic ID tags to track individual pairs of jeans and underwear, the first step in a system that advocates...The Wall Street Journal From ACM News | July 23, 2010
Each time you make a cellphone call, your network provider knows whom you're calling, for how long, and what device you're using. Now researchers at one of the...Technology Review From ACM News | July 22, 2010
In the year since the fatal, still-unexplained crash of a French airliner over the mid-Atlantic, interest has intensified in technologies to enhance the tracking...The New York Times From ACM News | July 21, 2010
The University of Maryland University College is reporting robust response to a first-of-its kind cybersecurity degree program scheduled to commence this fall.USA Today From ACM News | July 20, 2010
Life, as they say, imitates art. And the way things work commercially today across much of the Web recalls that chapter in “The Adventures of Tom Sawyer” where...The New York Times From ACM News | July 19, 2010
Google’s aggressive tactics have put it on top of the business world, and now the Internet giant is looking to leverage the high profile and sterling connections...Politico From ACM News | July 19, 2010
Asian handset makers HTC Corp. and Samsung Electronics Co. on Monday rebutted claims made by Apple Inc. that the iPhone 4's reception problems are shared by other...The Wall Street Journal From ACM News | July 19, 2010
A leading Chinese Internet regulator has vowed to reduce anonymity in China's portion of cyberspace, calling for requirements that people use their real names when...Associated Press From ACM News | July 14, 2010