acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

How the Feds Could Get Into Iphones Without Apple's Help
From ACM News

How the Feds Could Get Into Iphones Without Apple's Help

It's a showdown that has the country mesmerized.

Forcing Apple to Hack That Iphone Sets a Dangerous Precedent
From ACM Opinion

Forcing Apple to Hack That Iphone Sets a Dangerous Precedent

Are Apple and other tech companies somehow against America's national security if they create uncrackable encryption software that government investigators or even...

Apple's Fbi Battle Is Complicated. Here's What's Really Going On
From ACM News

Apple's Fbi Battle Is Complicated. Here's What's Really Going On

The news this week that a magistrate ordered Apple to help the FBI hack an iPhone used by one of the San Bernardino shooter suspects has polarized the nation—and...

Obama's Cybersecurity Plan Is Meant to Secure His Legacy
From ACM Opinion

Obama's Cybersecurity Plan Is Meant to Secure His Legacy

The end of White House terms are often about trying to shape historic legacies, and President Obama is out to build his in the new area of cybersecurity.

Proposed State Bans on Phone Encryption Make Zero Sense
From ACM Opinion

Proposed State Bans on Phone Encryption Make Zero Sense

American politics has long accepted the strange notion that just a pair of states—namely Iowa and New Hampshire—get an outsize vote in choosing America’s next president...

Space Mining Could Set Off a Star War
From ACM Opinion

Space Mining Could Set Off a Star War

Space is lousy with profits.

Security's Biggest Winners and Losers in 2015
From ACM Opinion

Security's Biggest Winners and Losers in 2015

This year, lawmakers surprised us by taking initial steps—albeit, baby ones—to rein in some of the NSA's mass spying and provide better oversight of the intelligence...

Crispr Is Getting Better. Now It's Time to Ask the Hard Ethical Questions
From ACM Opinion

Crispr Is Getting Better. Now It's Time to Ask the Hard Ethical Questions

When Chinese scientists announced in April they had edited human embryos using a new genetic tool called Crispr, the headlines blared "designer babies," and the...

How to Baffle Web Trackers By Obfuscating Your Movements Online
From ACM Opinion

How to Baffle Web Trackers By Obfuscating Your Movements Online

Online ad networks and search engines love it when you surf around.

Hackers Make Cars Safer. Don't Ban Them From Tinkering
From ACM Opinion

Hackers Make Cars Safer. Don't Ban Them From Tinkering

Virtually every new car sold today has some sort of network connection.

Tech Companies Can Blame Snowden For Data Privacy Decision
From ACM Opinion

Tech Companies Can Blame Snowden For Data Privacy Decision

A ruling the Europe Union’s highest court yesterday may create enormous headaches for US tech companies like Google and Facebook.

Who Won Science Fiction's Hugo Awards, and Why It Matters
From ACM Opinion

Who Won Science Fiction's Hugo Awards, and Why It Matters

Since 1953, to be nominated for a Hugo Award, among the highest honors in science fiction and fantasy writing, has been a dream come true for authors who love time...

Let's School the Presidential Hopefuls on Cybersecurity
From ACM Opinion

Let's School the Presidential Hopefuls on Cybersecurity

In the build up to the 2016 U.S. election, both Democratic and Republican presidential hopefuls are talking about cybersecurity—and specifically state-sponsored...

Why the Opm Breach Is Such a Security and Privacy Debacle
From ACM Opinion

Why the Opm Breach Is Such a Security and Privacy Debacle

If it's not already a maxim, it should be: Every big hack discovered will eventually prove to be more serious than first believed.

I Made an ­ntraceable 'ghost Gun' in My Office—and It Was Easy
From ACM Opinion

I Made an ­ntraceable 'ghost Gun' in My Office—and It Was Easy

This is my ghost gun. To quote the rifleman's creed, there are many like it, but this one is mine.

5 Ways We Must Regulate Drones at the ­.s. Border
From ACM Opinion

5 Ways We Must Regulate Drones at the ­.s. Border

Border patrol agents have Predator drones at their disposal, and using them has the potential to become a serious breach of privacy — but it also could be a terrific...

Google's Search ­pdated Will Remake the Web in Its Own Image
From ACM News

Google's Search ­pdated Will Remake the Web in Its Own Image

Some people are calling it Mobilegeddon.

Snowden's 'sexy Margaret Thatcher' Password Isn't So Secure
From ACM Opinion

Snowden's 'sexy Margaret Thatcher' Password Isn't So Secure

Edward Snowden appears to have a thing for the late British conservative prime minister Margaret Thatcher. And his obsession may even be clouding his famously paranoid...

Here's Google's Secret to Hiring the Best People
From ACM Opinion

Here's Google's Secret to Hiring the Best People

"You never get a second chance to make a first impression" was the tagline for a Head & Shoulders shampoo ad campaign in the 1980s. It unfortunately encapsulates...

Nsa Doesn't Need to Spy on Your Calls to Learn Your Secrets
From ACM Opinion

Nsa Doesn't Need to Spy on Your Calls to Learn Your Secrets

Governments and corporations gather, store, and analyze the tremendous amount of data we chuff out as we move through our digitized lives.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account