32 Results for

felten

Article

TrustyCon's RSA Conference rebels promise more to come

Government-sponsored malware, the legal implications of the US government's pro-spying defense, and a discussion of tools to fight for the future lit up the agenda at the first Trustworthy Technology Conference.

By February 27, 2014

Article

Facebook's mood study: How you became the guinea pig

That controversial research into how posts affect users' emotions is just latest in a long line of privacy flaps -- and apologies -- for the social networking giant.

By July 1, 2014

Article

Crypto, security, comp-sci specialists speak out on NSA

In an open letter, more than 50 luminaries in computer science, cryptography, and security join together to decry reported efforts by the agency to undermine encryption and network security.

By January 24, 2014

Article

Evidence presented in New Jersey e-voting discrepancies

Printed voting audits may help to detect fraud--unless the vendor offers a good excuse.

By April 29, 2008

Article

Twitter announces support for Do Not Track

The social network stops the tracking when users are on Firefox or other browsers that support the Do Not Track feature. Of course, that feature also has to be turned on.

By May 17, 2012

Article

Report: Obama narrows down CTO choices

The president-elect may have winnowed his options for a national CTO to two people, including a Cisco technologist, according to BusinessWeek.

By January 16, 2009

Article

Sequoia Voting Systems site hacked

Under fire for New Jersey vote discrepancies and legal threats against electronic voting systems researchers, the Sequoia Voting Systems blot site went dark Thursday.

By March 20, 2008

Article

Sequoia warns Princeton professors over e-voting analysis

E-voting machine manufacturer threatens legal action against computer scientists, state officials over a planned security analysis.

By March 18, 2008

Article

HDCP antipiracy leak opens doors for black boxes

Researchers say Intel's copy protection protocol has been known to be flawed for nine years and they aren't surprised by the news.

By September 17, 2010

Article

Researchers find security holes in NYT, YouTube, ING, MetaFilter sites

Attackers could have used vulnerabilities on several Web sites to compromise people's accounts, allowing them to steal money, harvest e-mail addresses, or pose as others online.

By October 2, 2008