Sign In

Communications of the ACM

Recent Articles



Software Has a Serious Supply-Chain Security Problem
From ACM Opinion

Software Has a Serious Supply-Chain Security Problem

The warnings consumers hear from information security pros tend to focus on trust: Don't click web links or attachments from an untrusted sender.

Apple's FaceID Could Be a Powerful Tool for Mass Spying
From ACM Opinion

Apple's FaceID Could Be a Powerful Tool for Mass Spying

This Tuesday Apple unveiled a new line of phones to much fanfare, but one feature immediately fell under scrutiny:FaceID, a tool that would use facial recognition...

You Are Already Living Inside a Computer
From ACM Opinion

You Are Already Living Inside a Computer

Suddenly, everything is a computer. Phones, of course, and televisions. Also toasters and door locks, baby monitors and juicers, doorbells and gas grills. Even ...

Why the iPhone X's Face ID Is a Terrible Way to Secure Your Data
From ACM Opinion

Why the iPhone X's Face ID Is a Terrible Way to Secure Your Data

The new iPhone X puts face recognition front and centre. Why? Because it is the quickest and easiest way to unlock your phone.

The Only Safe Email Is Text-Only Email
From ACM Opinion

The Only Safe Email Is Text-Only Email

It's troubling to think that at any moment you might open an email that looks like it comes from your employer, a relative or your bank, only to fall for a ...

How Facebook Changed the Spy Game
From ACM Opinion

How Facebook Changed the Spy Game

Any doubt that Russia has been running a strategically targeted disinformation campaign in the United States was erased on Wednesday, when Facebook revealed that...

The Fake-News Fallacy
From ACM Opinion

The Fake-News Fallacy

On the evening of October 30, 1938, a seventy-six-year-old millworker in Grover's Mill, New Jersey, named Bill Dock heard something terrifying on the radio.

The Darkening Web: Misinformation Is the Strongest Cyberweapon
From ACM Opinion

The Darkening Web: Misinformation Is the Strongest Cyberweapon

In late June, I was leaving for a flight from Kiev's Boryspil Airport as news broke that Ukraine was the victim of another massive cyberattack.

Stop Cyberattacks. Just Add Robots
From ACM Opinion

Stop Cyberattacks. Just Add Robots

"Are you a hacker?"

When Does Law Enforcement's Demand to Read Your Data Become a Demand to Read Your Mind?
From Communications of the ACM

When Does Law Enforcement's Demand to Read Your Data Become a Demand to Read Your Mind?

On cryptographic backdoors and prosthetic intelligence.

A Hunt for Ways to Combat Online Radicalization
From ACM Opinion

A Hunt for Ways to Combat Online Radicalization

Law enforcement officials, technology companies and lawmakers have long tried to limit what they call the "radicalization" of young people over the internet.

Sorry, Banning 'Killer Robots' Just Isn't Practical
From ACM Opinion

Sorry, Banning 'Killer Robots' Just Isn't Practical

Late Sunday, 116 entrepreneurs, including Elon Musk, released a letter to the United Nations warning of the dangerous "Pandora's Box" presented by weapons that...

Tracing the Sources of Today's Russian Cyberthreat
From ACM Opinion

Tracing the Sources of Today's Russian Cyberthreat

Beyond carrying all of our phone, text and internet communications, cyberspace is an active battleground, with cybercriminals, government agents and even military...

What the Announced NSA / Cyber Command Split Means
From ACM Opinion

What the Announced NSA / Cyber Command Split Means

The move to elevate Cyber Command to a full Unified Combatant Command and split it off from the National Security Agency or NSA shows that cyber intelligence collection...

Fighting Neo-Nazis and the Future of Free Expression
From ACM Opinion

Fighting Neo-Nazis and the Future of Free Expression

In the wake of Charlottesville, both GoDaddy and Google have refused to manage the domain registration for the Daily Stormer, a neo-Nazi website that, in the...

Russia's Election Meddling Backfired—Big-Time
From ACM Opinion

Russia's Election Meddling Backfired—Big-Time

Intelligence officers sometimes talk about "blowback," when covert actions go bad and end up damaging the country that initiated them.

End-to-End Encryption Isn't Enough Security for 'Real People'
From ACM Opinion

End-to-End Encryption Isn't Enough Security for 'Real People'

Government officials continue to seek technology companies' help fighting terrorism and crime. But the most commonly proposed solution would severely limit regular...

We Can Stop Hacking and Trolls, but It Would Ruin the Internet
From ACM Opinion

We Can Stop Hacking and Trolls, but It Would Ruin the Internet

Cyberterrorism fears are through the roof.

Preserving the Right to Cognitive Liberty
From ACM Opinion

Preserving the Right to Cognitive Liberty

The idea of the human mind as the domain of absolute protection from external intrusion has persisted for centuries.

Tracking Terrorists Online Might Invade Your Privacy
From ACM Opinion

Tracking Terrorists Online Might Invade Your Privacy

Remember that picture you sent to your family of your children playing in the paddling pool? Or that private text you sent to someone trusted? Or when you searched...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account