acm-header
Sign In

Communications of the ACM

Recent Opinion


bg-corner

Stuxnet Expert Calls ­.s. the 'good Guys' in Cyber-Warfare
From ACM Opinion

Stuxnet Expert Calls ­.s. the 'good Guys' in Cyber-Warfare

Sitting in the front row for the first full day of the International Conference on Cyber Conflict was one of the industry’s foremost "rock star" researchers, ...

Nations Must Talk to Halt 'cyber Terrorism': Kaspersky
From ACM Opinion

Nations Must Talk to Halt 'cyber Terrorism': Kaspersky

Eugene Kaspersky, whose lab discovered the Flame virus that has attacked computers in Iran and elsewhere in the Middle East, said on Wednesday only a global effort...

Why Antivirus Companies Like Mine Failed to Catch Flame and Stuxnet
From ACM Opinion

Why Antivirus Companies Like Mine Failed to Catch Flame and Stuxnet

A couple of days ago, I received an e-mail from Iran. It was sent by an analyst from the Iranian Computer Emergency Response Team, and it was informing me about...

Apple's Crystal Prison and the Future of Open Platforms
From ACM Opinion

Apple's Crystal Prison and the Future of Open Platforms

Two weeks ago, Steve Wozniak made a public call for Apple to open its platforms for those who wish to tinker, tweak and innovate with their internals. EFF supports...

What Fearmongers Get Wrong About Cyberwarfare
From ACM Opinion

What Fearmongers Get Wrong About Cyberwarfare

Should we worry about cyberwarfare? Judging by excessively dramatic headlines in the media, very much so. Cyberwarfare, the argument goes, might make wars easier...

From ACM Opinion

What's the Meaning of This: Flame Malware

From all indications, it would appear that attackers are continuing to attack and malware authors are carrying on writing malware.

A Measure of Control
From Communications of the ACM

A Measure of Control

Some limitations on measurements in software.

The Cybersecurity Risk
From Communications of the ACM

The Cybersecurity Risk

Increased attention to cybersecurity has not resulted in improved cybersecurity.

Scale Failure
From Communications of the ACM

Scale Failure

Using a tool for the wrong job is OK until the day when it isn't.

Security of the Internet and the Known Unknowns
From Communications of the ACM

Security of the Internet and the Known Unknowns

Seeking answers to questions about Internet vulnerabilities.

The Myth of the Elevator Pitch
From Communications of the ACM

The Myth of the Elevator Pitch

Instead of pitching, listen and offer.

Why Computer Scientists Should Care About Cyber Conflict and U.S. National Security Policy
From Communications of the ACM

Why Computer Scientists Should Care About Cyber Conflict and U.S. National Security Policy

Cybersecurity and policy issues for computer scientists.

'barcode Everyone at Birth'
From ACM Opinion

'barcode Everyone at Birth'

If I were empress of the Universe I would insist on every individual having a unique ID permanently attached—a barcode if you will—an implanted chip to provide...

What Does Facebook's $100 Billion Ipo Mean For You?
From ACM Opinion

What Does Facebook's $100 Billion Ipo Mean For You?

More ads.

­.n. Efforts Put Internet Freedom at Risk
From ACM Opinion

­.n. Efforts Put Internet Freedom at Risk

A mounting effort to transform a United Nations agency into a global Internet regulator is threatening to undo decades of policymaking that helped the Internet...

How a Private Data Market Could Ruin Facebook
From ACM Opinion

How a Private Data Market Could Ruin Facebook

To justify its sky-high valuation, Facebook will have to increase its profit per user at rates that seem unlikely, even by the most generous predictions.

Why the Death of DRM Would Be Good News for Readers, Writers, and Publishers
From ACM Opinion

Why the Death of DRM Would Be Good News for Readers, Writers, and Publishers

At the end of April, Tor Books, the world's largest science fiction publisher, and its UK sister company, Tor UK, announced that they would be eliminating digital...

Is It Time To Stop Trusting Google?
From ACM Opinion

Is It Time To Stop Trusting Google?

Was Google's snooping on home Wi-Fi users the work of a rogue software engineer? Was it a deliberate corporate strategy? Was it simply an honest-to-goodness mistake...

Following the Breadcrumbs on the Data-Sharing Trail
From ACM Opinion

Following the Breadcrumbs on the Data-Sharing Trail

Would you like to donate to the Obama campaign? Sign up for a college course? Or maybe subscribe to Architectural Digest? 

The World's Five Biggest Cyber Threats
From ACM News

The World's Five Biggest Cyber Threats

Criminals do not stop at stealing someone's personal data.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account