31 Results for

felten

Article

TrustyCon's RSA Conference rebels promise more to come

Government-sponsored malware, the legal implications of the US government's pro-spying defense, and a discussion of tools to fight for the future lit up the agenda at the first Trustworthy Technology Conference.

By Feb. 27, 2014

Article

Crypto, security, comp-sci specialists speak out on NSA

In an open letter, more than 50 luminaries in computer science, cryptography, and security join together to decry reported efforts by the agency to undermine encryption and network security.

By Jan. 24, 2014

Article

Evidence presented in New Jersey e-voting discrepancies

Printed voting audits may help to detect fraud--unless the vendor offers a good excuse.

By Apr. 29, 2008

Article

Twitter announces support for Do Not Track

The social network stops the tracking when users are on Firefox or other browsers that support the Do Not Track feature. Of course, that feature also has to be turned on.

By May. 17, 2012

Article

Report: Obama narrows down CTO choices

The president-elect may have winnowed his options for a national CTO to two people, including a Cisco technologist, according to BusinessWeek.

By Jan. 16, 2009

Article

Sequoia Voting Systems site hacked

Under fire for New Jersey vote discrepancies and legal threats against electronic voting systems researchers, the Sequoia Voting Systems blot site went dark Thursday.

By Mar. 20, 2008

Article

HDCP antipiracy leak opens doors for black boxes

Researchers say Intel's copy protection protocol has been known to be flawed for nine years and they aren't surprised by the news.

By Sep. 17, 2010

Article

Sequoia warns Princeton professors over e-voting analysis

E-voting machine manufacturer threatens legal action against computer scientists, state officials over a planned security analysis.

By Mar. 18, 2008

Article

Researchers find security holes in NYT, YouTube, ING, MetaFilter sites

Attackers could have used vulnerabilities on several Web sites to compromise people's accounts, allowing them to steal money, harvest e-mail addresses, or pose as others online.

By Oct. 2, 2008

Article

With improvements, e-voting could be good, says researcher.

Researcher who found vulnerabilities in California's e-voting systems looks ahead to better auditing.

By Feb. 16, 2008