acm-header
Sign In

Communications of the ACM

Recent Opinion


Articles Interviews Vardi's Insights Chien's Vantage Opinion Archive Refine your search:
dateMore Than a Year Ago
subjectSecurity
authorThe Washington Post
bg-corner

Why the Ftc Is Showing ­p at Hackers' Biggest Conferences
From ACM Opinion

Why the Ftc Is Showing ­p at Hackers' Biggest Conferences

The Federal Trade Commission, the de facto federal watchdog for consumers' privacy and data security, knows it needs help.

The Very Best Ideas For Preventing Artificial Intelligence from Wrecking the Planet
From ACM Opinion

The Very Best Ideas For Preventing Artificial Intelligence from Wrecking the Planet

The Boston-based Future of Life Institute, backed by a $10 million donation from Elon Musk, recently announced its list of 37 winners of research grants in the....

How the Astros Baseball Hack Explains Chinese Cyberespionage
From ACM Opinion

How the Astros Baseball Hack Explains Chinese Cyberespionage

Two major cybersecurity scandals are currently making headlines: One is the hack of an internal network belonging to a Major League Baseball team, allegedly bya...

Facial Recognition Technology Is Everywhere. It May Not Be Legal.
From ACM News

Facial Recognition Technology Is Everywhere. It May Not Be Legal.

Being anonymous in public might be a thing of the past.

How the Country's Top Privacy Cop Is Trying to Protect Consumers in the Digital Age
From ACM Opinion

How the Country's Top Privacy Cop Is Trying to Protect Consumers in the Digital Age

As the digital economy has exploded, tech companies are collecting untold amounts of data on everyday Americans.

The Real Winners in the Fight Over Government Surveillance
From ACM Opinion

The Real Winners in the Fight Over Government Surveillance

After the Senate passed legislation aimed at reforming a program that collected data about the phone calls of millions of Americans, Senate Majority Leader Mitch...

The White House Just Snagged One of the Most Valuable Players in the Tech Policy World
From ACM Opinion

The White House Just Snagged One of the Most Valuable Players in the Tech Policy World

The White House is adding one of the tech policy world's most valuable players to its roster: Princeton Professor Ed Felten.

Why the Ruling Against the Nsa's Phone Records Program Could Have Huge Implications
From ACM Opinion

Why the Ruling Against the Nsa's Phone Records Program Could Have Huge Implications

A federal appeals court ruling that the National Security Agency's collection of millions of Americans' phone records is illegal could undercut more than just that...

What 'the Imitation Game' Didn't Tell You About Turing's Greatest Triumph
From ACM Opinion

What 'the Imitation Game' Didn't Tell You About Turing's Greatest Triumph

Freeman Dyson, 91, the famed physicist, author and oracle of human destiny, is holding forth after tea-time one February afternoon in the common room of the Institute...

Robots Are Sneaking ­p On Congress (along with Four Other Tech Trends)
From ACM Opinion

Robots Are Sneaking ­p On Congress (along with Four Other Tech Trends)

One of the best Twitter accounts inside the Beltway or out—belongs to former representativeJohn Dingell (D-Mich.), who announced his retirement with self-effacing...

A Q&a With the Hackers Who Say They Helped Break Into Sony's Network
From ACM Opinion

A Q&a With the Hackers Who Say They Helped Break Into Sony's Network

Lizard Squad. That's the hacker group whose name is suddenly on everyone's lips after it took credit for ruining Christmas for PlayStation and Xbox gamers everywhere...

These Are 3 Breakthrough Science Ideas You'll Be Talking About in 2015
From ACM Opinion

These Are 3 Breakthrough Science Ideas You'll Be Talking About in 2015

For anyone who has ever said that all the STEM professions need is something to make them "cool" in order to attract more young people, look no further than ...

The Toughest Case: What If Osama Bin Laden Had an Iphone?
From ACM Opinion

The Toughest Case: What If Osama Bin Laden Had an Iphone?

In rebuking Apple and Google for their new smartphone encryption polices on Thursday, FBI Director James B. Comey became the latest law enforcement official to...

Why Internet Governance Should Be Left to the Engineers
From ACM Opinion

Why Internet Governance Should Be Left to the Engineers

As the Internet and the disruptive innovations it spawns are becoming economically, politically, and culturally vital for the world’s three billion users (and counting)...

Why One of Cybersecurity's Thought Leaders ­ses a Pager Instead of a Smart Phone
From ACM Opinion

Why One of Cybersecurity's Thought Leaders ­ses a Pager Instead of a Smart Phone

In the computer and network security industry, few people are as well known as Dan Geer.

How to Talk About Blowing Things ­p in Cyberspace, According to the Military
From ACM Opinion

How to Talk About Blowing Things ­p in Cyberspace, According to the Military

Bombs are relatively simple, when you boil everything down.

The Case That Might Cripple Facebook
From ACM Opinion

The Case That Might Cripple Facebook

An Irish judge has rendered a preliminary judgment that may have sweeping consequences for U.S. e-commerce firms.

China's Cyber-Generals Are Reinventing the Art of War
From ACM Opinion

China's Cyber-Generals Are Reinventing the Art of War

The conventional wisdom is that the future of war will involve private robot armies, predator drones carrying out precision strikes, and maybe even the militarization...

How Cloud Storage Complicates the Supreme Court Debate Over Cell Phone Privacy
From ACM News

How Cloud Storage Complicates the Supreme Court Debate Over Cell Phone Privacy

Should police be able to search the contents of your smartphone without a warrant?

Hackers Allegedly Stole $400 Million in Bitcoins. Here's How to Catch Them.
From ACM Opinion

Hackers Allegedly Stole $400 Million in Bitcoins. Here's How to Catch Them.

On Friday, what had been the world's leading Bitcoin exchange declared bankrutpcy, claiming that hackers had exploited a technical issue called "transaction malleability...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account