32 Results for



TrustyCon's RSA Conference rebels promise more to come

Government-sponsored malware, the legal implications of the US government's pro-spying defense, and a discussion of tools to fight for the future lit up the agenda at the first Trustworthy Technology Conference.

By February 27, 2014


Facebook's mood study: How you became the guinea pig

That controversial research into how posts affect users' emotions is just latest in a long line of privacy flaps -- and apologies -- for the social networking giant.

By July 1, 2014


Crypto, security, comp-sci specialists speak out on NSA

In an open letter, more than 50 luminaries in computer science, cryptography, and security join together to decry reported efforts by the agency to undermine encryption and network security.

By January 24, 2014


Evidence presented in New Jersey e-voting discrepancies

Printed voting audits may help to detect fraud--unless the vendor offers a good excuse.

By April 29, 2008


Twitter announces support for Do Not Track

The social network stops the tracking when users are on Firefox or other browsers that support the Do Not Track feature. Of course, that feature also has to be turned on.

By May 17, 2012


Report: Obama narrows down CTO choices

The president-elect may have winnowed his options for a national CTO to two people, including a Cisco technologist, according to BusinessWeek.

By January 16, 2009


Sequoia Voting Systems site hacked

Under fire for New Jersey vote discrepancies and legal threats against electronic voting systems researchers, the Sequoia Voting Systems blot site went dark Thursday.

By March 20, 2008


Sequoia warns Princeton professors over e-voting analysis

E-voting machine manufacturer threatens legal action against computer scientists, state officials over a planned security analysis.

By March 18, 2008


HDCP antipiracy leak opens doors for black boxes

Researchers say Intel's copy protection protocol has been known to be flawed for nine years and they aren't surprised by the news.

By September 17, 2010


Researchers find security holes in NYT, YouTube, ING, MetaFilter sites

Attackers could have used vulnerabilities on several Web sites to compromise people's accounts, allowing them to steal money, harvest e-mail addresses, or pose as others online.

By October 2, 2008