Here is a look at some of the highlights and scarier happenings taking place at the annual Black Hat hacker conference in Las Vegas last week.The New York Times From ACM Opinion | July 30, 2012
A big part of Magistrate Judge Stephen W. Smith's job in Federal District Court in Houston is to consider law enforcement requests for cellphone and email records...The New York Times From ACM Opinion | July 26, 2012
Cellphones, email, and online social networking have come to rule daily life, but Congress has done nothing to update federal privacy laws to better protect digital...The New York Times From ACM Opinion | July 16, 2012
The decision by the United States and Israel to develop and then deploy the Stuxnet computer worm against an Iranian nuclear facility late in George W. Bush's presidency...The New York Times From ACM Opinion | June 26, 2012
That little iPhone in your pocket is perfectly positioned to become a clone of the credit cards in your wallet or purse.The New York Times From ACM News | June 12, 2012
In December 2010, after we had reverse engineered the Stuxnet virus, I argued that the attackers must have known they would open Pandora's box. Others suggested...The New York Times From ACM Opinion | June 6, 2012
We live in a technological universe in which we are always communicating. And yet we have sacrificed conversation for mere connection.The New York Times From ACM Opinion | May 4, 2012
Would you like to donate to the Obama campaign? Sign up for a college course? Or maybe subscribe to Architectural Digest? The New York Times From ACM Opinion | May 1, 2012
Earlier this month state senators in Tennessee approved an update to our sex-education law that would ban teachers from discussing hand-holding, which it categorizes...The New York Times From ACM Opinion | April 30, 2012
Back in 2004, as Google prepared to go public, Larry Page and Sergey Brin celebrated the maxim that was supposed to define their company: "Don’t be evil."The New York Times From ACM Opinion | April 25, 2012
The George W. Bush team must be consumed with envy. Britain's government is preparing sweeping new legislation that would let the country's domestic intelligence...The New York Times From ACM Opinion | April 16, 2012
For the last two months, senior government officials and private-sector experts have paraded before Congress and described in alarming terms a silent threat: cyberattacks...The New York Times From ACM Opinion | April 3, 2012
Back in 2006, before the Obama administration made leak prosecutions routine, a panel of three federal appeals court judges in New York struggled to decide whether...The New York Times From ACM Opinion | February 16, 2012
Every day, those of us who live in the digital world give little bits of ourselves away. On Facebook and LinkedIn. To servers that store our email, Google searches...The New York Times From ACM Opinion | February 1, 2012
We welcomed the collapse this month of two flawed bills to prevent online piracy, bills that could have stifled speech and undermined Internet safety. But piracy...The New York Times From ACM Opinion | January 30, 2012
Solitude is out of fashion. Our companies, our schools and our culture are in thrall to an idea I call the New Groupthink, which holds that creativity and achievement...The New York Times From ACM Opinion | January 16, 2012
Through the National Institutes of Health, American taxpayers have long supported research directed at understanding and treating human disease.The New York Times From ACM Opinion | January 11, 2012