Bruce Schneieer ordered a Coke, no ice, at the Rio casino on a Saturday afternoon. I ordered Diet Coke, also no ice, and handed the bartender an American Express...The New York Times From ACM Opinion | August 13, 2012
A blackout in Manhattan. A major dam failure. Mayhem at a chemical plant. Those are all potential, and entirely plausible, consequences of a cyber attack, according...Time From ACM Opinion | August 7, 2012
A typical American school day finds some six million high school students and two million college freshmen struggling with algebra.The New York Times From ACM Opinion | July 31, 2012
Here is a look at some of the highlights and scarier happenings taking place at the annual Black Hat hacker conference in Las Vegas last week.The New York Times From ACM Opinion | July 30, 2012
A big part of Magistrate Judge Stephen W. Smith's job in Federal District Court in Houston is to consider law enforcement requests for cellphone and email records...The New York Times From ACM Opinion | July 26, 2012
Gordon Crovitz of the Wall Street Journal's editorial page reopens the ancient debate over who invented the Internet with a column Monday calling out the notion...Los Angeles Times From ACM Opinion | July 24, 2012
The tech sector is set to grow faster than all but five industries by 2020. Out of those fields, half of which are related to healthcare, tech pays the best with...Time From ACM Opinion | July 18, 2012
Cellphones, email, and online social networking have come to rule daily life, but Congress has done nothing to update federal privacy laws to better protect digital...The New York Times From ACM Opinion | July 16, 2012
The decision by the United States and Israel to develop and then deploy the Stuxnet computer worm against an Iranian nuclear facility late in George W. Bush's presidency...The New York Times From ACM Opinion | June 26, 2012
That little iPhone in your pocket is perfectly positioned to become a clone of the credit cards in your wallet or purse.The New York Times From ACM News | June 12, 2012
Another day, another senior al-Qaeda leader killed by a drone strike. (I can't be the first to point out that being al-Qaeda's No. 2 is like being the drummer for...Time From ACM Opinion | June 9, 2012
In December 2010, after we had reverse engineered the Stuxnet virus, I argued that the attackers must have known they would open Pandora's box. Others suggested...The New York Times From ACM Opinion | June 6, 2012
We live in a technological universe in which we are always communicating. And yet we have sacrificed conversation for mere connection.The New York Times From ACM Opinion | May 4, 2012
Would you like to donate to the Obama campaign? Sign up for a college course? Or maybe subscribe to Architectural Digest? The New York Times From ACM Opinion | May 1, 2012
Earlier this month state senators in Tennessee approved an update to our sex-education law that would ban teachers from discussing hand-holding, which it categorizes...The New York Times From ACM Opinion | April 30, 2012
Back in 2004, as Google prepared to go public, Larry Page and Sergey Brin celebrated the maxim that was supposed to define their company: "Don’t be evil."The New York Times From ACM Opinion | April 25, 2012
The George W. Bush team must be consumed with envy. Britain's government is preparing sweeping new legislation that would let the country's domestic intelligence...The New York Times From ACM Opinion | April 16, 2012
For the last two months, senior government officials and private-sector experts have paraded before Congress and described in alarming terms a silent threat: cyberattacks...The New York Times From ACM Opinion | April 3, 2012