acm-header
Sign In

Communications of the ACM

Recent Articles


Articles Interviews Vardi's Insights Chien's Vantage Opinion Archive Refine your search:
dateMore Than a Year Ago
subjectSecurity
authorThe New York Times
bg-corner

The Strange Allure of the Blockchain
From ACM Opinion

The Strange Allure of the Blockchain

Are we too aggressively looking to replace the danger of unjust financial systems with wildly risky alternative currencies?

The Dream of U.S.-Made Computer Chips
From ACM Opinion

The Dream of U.S.-Made Computer Chips

Before we invest in making more chips on U.S. soil, we should be asking what we're trying to achieve

It's Time to Stop Paying for a VPN
From ACM Opinion

It's Time to Stop Paying for a VPN

Many services meant to protect your Web browsing can no longer be trusted

America Is Being Held for Ransom, and It Needs to Fight Back
From ACM Opinion

America Is Being Held for Ransom, and It Needs to Fight Back

A comprehensive anti-ransomware strategy must make it tougher for criminal groups and their sponsors to carry out attacks

Apple and Facebook Are Coming for Your Face Next
From ACM Opinion

Apple and Facebook Are Coming for Your Face Next

The face computer is coming—brace yourself

There's a Better Way to Stop Ransomware Attacks
From ACM Opinion

There's a Better Way to Stop Ransomware Attacks

Adopt and enforce regulations for the cryptocurrency industry that are equivalent to traditional banking

Could Cyberwar Make the World Safer?
From ACM Opinion

Could Cyberwar Make the World Safer?

Perhaps, if nations can settle for slugging it out online, rather than with guns and missiles?

The Crackdown in China Is a Hot Mess, and It's Coming for Us
From ACM Opinion

The Crackdown in China Is a Hot Mess, and It's Coming for Us

Recent moves by the Chinese government against tech companies represent a terrifying government action.

Should Alexa Read Our Moods?
From ACM Opinion

Should Alexa Read Our Moods?

Companies should be barred from analyzing what people say and how they sound to recommend products or personalize advertising messages.

Tech in the Post-Pandemic World
From ACM Opinion

Tech in the Post-Pandemic World

Assessing its future, both the bad and the good.

Why Was SolarWinds So Vulnerable to a Hack?
From ACM Opinion

Why Was SolarWinds So Vulnerable to a Hack?

The federal government should set minimum security standards for software and software development.

A Case for Banning Facial Recognition
From ACM Opinion

A Case for Banning Facial Recognition

A Google research scientist explains why she thinks the police shouldn't use facial recognition software.

We're Banning Facial Recognition. We're Missing the Point.
From ACM Opinion

We're Banning Facial Recognition. We're Missing the Point.

The whole point of modern surveillance is to treat people differently, and facial recognition technologies are only a small part of that.

We Shouldn't be Scared by 'Superintelligent A.I.'
From ACM Opinion

We Shouldn't be Scared by 'Superintelligent A.I.'

Bostrom, Russell, and other writers argue that even if the probability is small that superintelligent machines will emerge in the foreseeable future, we should...

How Silicon Valley Puts the 'Con' in Consent
From ACM Opinion

How Silicon Valley Puts the 'Con' in Consent

The average person would have to spend 76 working days reading all of the digital privacy policies they agree to in the span of a year. Reading Amazon's terms and...

The Tech That Was Fixed in 2018 and the Tech That Still Needs Fixing
From ACM Opinion

The Tech That Was Fixed in 2018 and the Tech That Still Needs Fixing

Personal technology was so awful this year that nobody would think you were paranoid if you dug a hole and buried your computer, phone and smart speaker under six...

Can the ­.S. Stop China From Controlling the Next Internet Age?
From ACM Opinion

Can the ­.S. Stop China From Controlling the Next Internet Age?

Imagine, if you will (and you should), a big American tech executive being detained over unspecified charges while on a trip to Beijing.

The End of Privacy Began in the 1960s
From ACM Opinion

The End of Privacy Began in the 1960s

In the fall of 1965, President Lyndon Johnson's administration announced a plan to consolidate hundreds of federal databases into one centralized National Data...

The New Radicalization of the Internet
From ACM Opinion

The New Radicalization of the Internet

Social media has played a key role in the recent rise of violent right-wing extremism in the United States, including three recent incidents—one in which a man...

How Will We Outsmart A.I. Liars?
From ACM Opinion

How Will We Outsmart A.I. Liars?

During the summer before the 2016 presidential election, John Seymour and Philip Tully, two researchers with ZeroFOX, a security company in Baltimore, unveiled...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account