Cybersecurity efforts in the United States have largely centered on defending computer networks against attacks by hackers, criminals, and foreign governments,...The New York Times From ACM Opinion | September 10, 2012
Apple's victory on Friday in a patent lawsuit against Samsung could, if upheld, give its rivals a kick in the pants to create more original products.The New York Times From ACM Opinion | August 27, 2012
In March 2002, John M. Poindexter, a former national security adviser to President Ronald Reagan, sat down with Gen. Michael V. Hayden, the director of the National...The New York Times From ACM Opinion | August 24, 2012
NASA's newest marvel, a one-ton rover named Curiosity, has been set down with all the delicacy of a carton of eggs on the surface of Mars.The New York Times From ACM Opinion | August 14, 2012
Bruce Schneieer ordered a Coke, no ice, at the Rio casino on a Saturday afternoon. I ordered Diet Coke, also no ice, and handed the bartender an American Express...The New York Times From ACM Opinion | August 13, 2012
Here is a look at some of the highlights and scarier happenings taking place at the annual Black Hat hacker conference in Las Vegas last week.The New York Times From ACM Opinion | July 30, 2012
A big part of Magistrate Judge Stephen W. Smith's job in Federal District Court in Houston is to consider law enforcement requests for cellphone and email records...The New York Times From ACM Opinion | July 26, 2012
Cellphones, email, and online social networking have come to rule daily life, but Congress has done nothing to update federal privacy laws to better protect digital...The New York Times From ACM Opinion | July 16, 2012
Late last summer, I was introduced to a new special someone. I wasn’t looking to meet this new muse; it all just kind of happened.The New York Times From ACM Opinion | July 16, 2012
The decision by the United States and Israel to develop and then deploy the Stuxnet computer worm against an Iranian nuclear facility late in George W. Bush's presidency...The New York Times From ACM Opinion | June 26, 2012
In what way do you spend your time online? Do you check your email compulsively? Watch lots of videos? Switch frequently among multiple Internet applications—from...The New York Times From ACM News | June 18, 2012
If you're an experienced computer user, you probably remember explaining to newbies how a desktop computer worked: Your photos should go in this folder; your documents...The New York Times From ACM Opinion | June 15, 2012
That little iPhone in your pocket is perfectly positioned to become a clone of the credit cards in your wallet or purse.The New York Times From ACM News | June 12, 2012
In December 2010, after we had reverse engineered the Stuxnet virus, I argued that the attackers must have known they would open Pandora's box. Others suggested...The New York Times From ACM Opinion | June 6, 2012
We live in a technological universe in which we are always communicating. And yet we have sacrificed conversation for mere connection.The New York Times From ACM Opinion | May 4, 2012
Would you like to donate to the Obama campaign? Sign up for a college course? Or maybe subscribe to Architectural Digest? The New York Times From ACM Opinion | May 1, 2012