Government-sponsored malware, the legal implications of the US government's pro-spying defense, and a discussion of tools to fight for the future lit up the agenda at the first Trustworthy Technology Conference.
In an open letter, more than 50 luminaries in computer science, cryptography, and security join together to decry reported efforts by the agency to undermine encryption and network security.
Printed voting audits may help to detect fraud--unless the vendor offers a good excuse.
The social network stops the tracking when users are on Firefox or other browsers that support the Do Not Track feature. Of course, that feature also has to be turned on.
The president-elect may have winnowed his options for a national CTO to two people, including a Cisco technologist, according to BusinessWeek.
Under fire for New Jersey vote discrepancies and legal threats against electronic voting systems researchers, the Sequoia Voting Systems blot site went dark Thursday.
Researchers say Intel's copy protection protocol has been known to be flawed for nine years and they aren't surprised by the news.
E-voting machine manufacturer threatens legal action against computer scientists, state officials over a planned security analysis.
Attackers could have used vulnerabilities on several Web sites to compromise people's accounts, allowing them to steal money, harvest e-mail addresses, or pose as others online.
Researcher who found vulnerabilities in California's e-voting systems looks ahead to better auditing.