acm-header
Sign In

Communications of the ACM

Recent Articles


Articles Interviews Vardi's Insights Opinion Archive Refine your search:
dateMore Than a Year Ago
subjectSecurity
authorThe Washington Post

These Are 3 Breakthrough Science Ideas You'll Be Talking About in 2015
From ACM Opinion

These Are 3 Breakthrough Science Ideas You'll Be Talking About in 2015

For anyone who has ever said that all the STEM professions need is something to make them "cool" in order to attract more young people, look no further than ...

The Toughest Case: What If Osama Bin Laden Had an Iphone?
From ACM Opinion

The Toughest Case: What If Osama Bin Laden Had an Iphone?

In rebuking Apple and Google for their new smartphone encryption polices on Thursday, FBI Director James B. Comey became the latest law enforcement official to...

Why Internet Governance Should Be Left to the Engineers
From ACM Opinion

Why Internet Governance Should Be Left to the Engineers

As the Internet and the disruptive innovations it spawns are becoming economically, politically, and culturally vital for the world’s three billion users (and counting)...

How to Talk About Blowing Things ­p in Cyberspace, According to the Military
From ACM Opinion

How to Talk About Blowing Things ­p in Cyberspace, According to the Military

Bombs are relatively simple, when you boil everything down.

The Case That Might Cripple Facebook
From ACM Opinion

The Case That Might Cripple Facebook

An Irish judge has rendered a preliminary judgment that may have sweeping consequences for U.S. e-commerce firms.

China's Cyber-Generals Are Reinventing the Art of War
From ACM Opinion

China's Cyber-Generals Are Reinventing the Art of War

The conventional wisdom is that the future of war will involve private robot armies, predator drones carrying out precision strikes, and maybe even the militarization...

How Cloud Storage Complicates the Supreme Court Debate Over Cell Phone Privacy
From ACM News

How Cloud Storage Complicates the Supreme Court Debate Over Cell Phone Privacy

Should police be able to search the contents of your smartphone without a warrant?

The Political Science of Cybersecurity III—How International Relations Theory Shapes U.S. Cybersecurity Doctrine
From ACM Opinion

The Political Science of Cybersecurity III—How International Relations Theory Shapes U.S. Cybersecurity Doctrine

U.S. cybersecurity officials have been much more skeptical about international cooperation than their Cold War counterparts were.

Why Tech Companies and the NSA Diverge on Snowden
From ACM Opinion

Why Tech Companies and the NSA Diverge on Snowden

Is Edward Snowden a whistleblower or a traitor?

Here's Why Tech Companies' Nsa 'transparency Reports' Are Mostly a Pr Stunt
From ACM Opinion

Here's Why Tech Companies' Nsa 'transparency Reports' Are Mostly a Pr Stunt

Technology companies will soon be able to disclose more details about the number of national security orders and requests they receive, according to a joint statement...

From ACM Opinion

Bitcoin—boom or Bubble?

The baffling Bitcoin boom is either an exercise in self-delusion—a high-tech Ponzi scheme that will come crashing down—or an imaginative new Internet technology...

10 Bold Predictions For 2014
From ACM Opinion

10 Bold Predictions For 2014

At the beginning of each year, it's possible to make predictions about the future of the tech sector simply by extrapolating from data in the latest Mary Meeker...

Dogecoins and Litecoins and Peercoins Oh My: What You Need to Know About Bitcoin Alternatives
From ACM News

Dogecoins and Litecoins and Peercoins Oh My: What You Need to Know About Bitcoin Alternatives

By now, most people have heard of Bitcoin, the peer-to-peer currency whose value has soared over the past couple of years.

Correcting the Record on the Nsa Review
From ACM Opinion

Correcting the Record on the Nsa Review

One of the dangers of a 304 -page report on a complex subject is that everyone gets to choose what he or she thinks is the bottom line.

Tor Is Supposed to Hide You Online. In This Harvard Student's Case, It Did the Opposite.
From ACM Opinion

Tor Is Supposed to Hide You Online. In This Harvard Student's Case, It Did the Opposite.

At 9 a.m. Monday, fire alarms went off in Harvard's Emerson Hall.

No, Bitcoin Isn't Broken
From ACM Opinion

No, Bitcoin Isn't Broken

"Bitcoin Is Broken," proclaimed Ittay Eyal and Emin Gun Sirer, two Cornell computer scientists.

Here's Everything You Should Know About Nsa Address Book Spying in One Faq
From ACM News

Here's Everything You Should Know About Nsa Address Book Spying in One Faq

A new report from The Washington Post, based on documents provided by whistleblower Edward Snowden, reveals that the National Security Agency is collecting hundreds...

Here's Why Cops Should Be Required to Wear a Lapel Camera While on Duty
From ACM Opinion

Here's Why Cops Should Be Required to Wear a Lapel Camera While on Duty

Police officers in Rialto, Calif., carry cameras to record their every action while on duty.

The New York Times Was Losing $5 Per Second Thanks to Its Web Site Outage
From ACM News

The New York Times Was Losing $5 Per Second Thanks to Its Web Site Outage

The New York Times is still reeling from a massive Web outage that took down its homepage, its corporate Web site, and everything in between.

The Coming Political Battle Over Bitcoin
From ACM Opinion

The Coming Political Battle Over Bitcoin

Given that Bitcoin first broke into mainstream attention when Gawker explained how to use it to buy drugs, perhaps the surprise is that it took federal regulators...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account