acm-header
Sign In

Communications of the ACM

Recent Articles


Articles Interviews Vardi's Insights Chien's Vantage Opinion Archive Refine your search:
dateMore Than a Year Ago
subjectSecurity
authorSlate
bg-corner

How to Fight the Next $1 Billion Bank Hack
From ACM Opinion

How to Fight the Next $1 Billion Bank Hack

Good news! A major hack you don't have to worry about! Unless, that is, you happen to be an executive or security employee at one of the hundreds of banks targeted...

The Sony Hackers Are Terrorists
From ACM Opinion

The Sony Hackers Are Terrorists

The Sony Pictures hack is important, and the Sony Pictures hack is terrifying.

Dumbing It Down in the Cockpit
From ACM Opinion

Dumbing It Down in the Cockpit

Long gone are the leather jackets, goggles, and silk scarves flung over the shoulders of aviators who wrestled with flight controls, furiously scanned instruments...

You Should Be Terrified of Superintelligent Machines
From ACM Opinion

You Should Be Terrified of Superintelligent Machines

In the recent discussion over the risks of developing superintelligent machines—that is, machines with general intelligence greater than that of humans—two narratives...

Google's Eyes in the Sky
From ACM Opinion

Google's Eyes in the Sky

When Sergey Brin and Larry Page built the search engine that would become Google, they started by making maps.

Why Did the Justice Department Indict Five Chinese Military Officers?
From ACM Opinion

Why Did the Justice Department Indict Five Chinese Military Officers?

At first glance, the Justice Department's 31-count indictment of five Chinese military officers for hacking into the computers of six American corporations, in...

The Lewis Effect
From ACM Opinion

The Lewis Effect

Michael Lewis couldn't have timed it better if he'd tried.

What Do Data Brokers Know About Me?
From ACM Opinion

What Do Data Brokers Know About Me?

I once ran into a friend and her husband at the playground in our neighborhood in Manhattan.

The Weirdest Thing About the Apple Security Bug Is How Simple It Was
From ACM Opinion

The Weirdest Thing About the Apple Security Bug Is How Simple It Was

So for the past 18 months, there has been a horrific security hole in many of Apple's products that has allowed "man in the middle" attacks on supposedly secure...

Good Riddance to Mt. Gox
From ACM Opinion

Good Riddance to Mt. Gox

It is over. Mt. Gox, bitcoin’s oldest—and once its most popular—exchange, was taken offline Monday night, leaving behind angry customers and acrimonious debate...

Let the Nsa Keep Hold of the Data
From ACM Opinion

Let the Nsa Keep Hold of the Data

One of the recommendations by the president's Review Group on Intelligence and Communications Technologies on reforming the National Security Agency—No. 5, if you're...

Pretty Good Privacy
From ACM Opinion

Pretty Good Privacy

Few critics of the NSA will find much satisfaction in President Obama's speech this morning or in the set of reforms that he announced.

It's the 30th Anniversary of the Supreme Court's Monumental Decision About Betamax
From ACM Opinion

It's the 30th Anniversary of the Supreme Court's Monumental Decision About Betamax

Those of us who came of age in the Internet era may not know that they owe their ability to go online to a court decision 30 years ago today about a mechanically...

Why Snowden Won't (and Shouldn't) Get Clemency
From ACM Opinion

Why Snowden Won't (and Shouldn't) Get Clemency

I regard Daniel Ellsberg as an American patriot.

The Nsa's Metadata Program Is Perfectly Constitutional
From ACM Opinion

The Nsa's Metadata Program Is Perfectly Constitutional

Last month two judges issued two different opinions about the NSA's controversial bulk metadata collection program.

Whither Net Neutrality?
From ACM Opinion

Whither Net Neutrality?

As the new Federal Communications Commission chairman, Tom Wheeler, has kicked up some dust in the tech community by laying the groundwork for a grand vision for...

Metadata Isn't Going Away. Here's How to Control It.
From ACM Opinion

Metadata Isn't Going Away. Here's How to Control It.

It's a good bet that, in the next few weeks, President Obama will impose some serious reforms—and ask Congress to enact a few more—on how the National Security...

Why Obama Still ­ses a BlackBerry
From ACM Opinion

Why Obama Still ­ses a BlackBerry

Barack Obama is the world's most prominent BlackBerry user.

Can You Hack It?
From ACM Opinion

Can You Hack It?

Wherever you're sitting right now, take a moment to note the connected devices around you.

WikiLeaks' Teenage Benedict Arnold
From ACM Opinion

WikiLeaks' Teenage Benedict Arnold

When he met Julian Assange for the first time, Sigurdur Thordarson admired the WikiLeaks founder's attitude and quickly signed up to the cause.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account