In computing, the vision always precedes the reality by a decade or more. The pattern has held true from the personal computer to the Internet, as it takes time...The New York Times From ACM News | February 1, 2010
On a Monday morning earlier this month, top Pentagon leaders gathered to simulate how they would respond to a sophisticated cyberattack aimed at paralyzing the...The New York Times From ACM News | January 26, 2010
Back at the dawn of the Web, the most popular account password was “12345.”
Today, it’s one digit longer but hardly safer: “123456.”
Despite all the reports...The New York Times From ACM News | January 21, 2010
The crown jewels of Google, Cisco Systems or any other technology company are the millions of lines of programming instructions, known as source code, that make...The New York Times From ACM News | January 20, 2010
U.S. colleges are adding courses and specialized degrees in the once-exotic field of cybersecurity to try to meet the growing demands for computer security skills...The New York Times From ACM TechNews | January 8, 2010
For over a decade now, health care experts have been promoting telemedicine, or the use of satellite technology, video conferencing and data transfer through phones...The New York Times From ACM News | January 8, 2010
Nearly seven months after highlighting the vulnerability of banking, energy and communications systems to Internet attacks, the White House on Tuesday is expected...The New York Times From ACM News | December 22, 2009
MOUNTAIN VIEW, Calif. — Google began lifting the veil on its planned Chrome operating system on Thursday, but it said that computers powered by the software would...The New York Times From ACM News | November 20, 2009
Like a ghost ship, a rogue software program that glided onto the Internet last November has confounded the efforts of top security experts to eradicate the program...The New York Times From ACM News | August 27, 2009
At the core of the U.S. Obama Administration and its Pentagon leadership's efforts to develop rules governing cyberwarfare is the question of whether offensive...The New York Times From ACM TechNews | August 3, 2009
To track the spread of botnets, Sandia National Laboratories computer security specialists Rob Minnich and Don Rudish have converted a Dell Thunderbird supercomputer...The New York Times From ACM TechNews | July 29, 2009
A National Security Agency (NSA) operation involving surveillance of American residents' communications, especially domestic email, is fueling debate in the U.S...The New York Times From ACM TechNews | June 17, 2009
U.S. President Barack Obama announced that the country's disjointed efforts to "deter, prevent, detect, and defend" against cyberattacks will now be run by the...The New York Times From ACM TechNews | June 1, 2009
The U.S. government’s urgent push into cyberwarfare has set off a rush among the biggest military companies for billions of dollars in new defense contracts. The...The New York Times From ACM News | June 1, 2009
The U.S. Pentagon is planning to establish a new cyberwarfare command as a complement to a soon-to-be-announced civilian computer network safety overhaul, according...The New York Times From ACM TechNews | May 29, 2009
To stay one jump ahead of fraudsters and their automated rogue programs, researchers are devising more versions of CAPTCHA (Completely Automated Public Turing test...The New York Times From ACM News | May 26, 2009
The Internet is rife with cybercriminals and online eavesdroppers, and countering this threat is the job of cybersleuths. One of the key tools in cybersleuths'...The New York Times From ACM TechNews | May 13, 2009
A lost or stolen laptop or notebook computer is replaceable; the stolen data inside it may produce real owner's anxiety. Which makes Fujitsu's newly announced "security...The New York Times From ACM News | May 13, 2009
Throughout the U.S. military there is heightened awareness that the threat of a computer attack is just as urgent as a physical attack, and that military units...The New York Times From ACM TechNews | May 11, 2009
People around the world are circumventing their governments' censorship of Web content using tools developed and provided by a diverse coalition of political and...The New York Times From ACM TechNews | May 1, 2009