In a Monday article, we described the security and reliability problems that have undermined public confidence in electronic voting machines within the United States...ArsTechnica From ACM Opinion | October 25, 2012
The FBI recently put out a mobile malware alert, providing us with a sobering reminder of this "evil software" for phones and tablets.Wired From ACM Opinion | October 25, 2012
Last week, a congressional report claimed that using Chinese telecommunications companies’ goods and services in the United States could threaten national security...Slate From ACM Opinion | October 24, 2012
Seeking solutions to concerns that go beyond the engineering of the smart grid.Timothy Kostyk, Joseph Herkert From Communications of the ACM | November 1, 2012
A multipronged approach to preparing computer science teachers is critical to success.Aman Yadav, John T. Korb From Communications of the ACM | November 1, 2012
Assessing the first phase of the trial based on claims that Google's Android platform infringes Oracle's Java-related copyrights and patents.
Pamela Samuelson From Communications of the ACM | November 1, 2012
Security research can be improved by more effectively sharing what is learned from attacks on information systems.David Basin, Srdjan Capkun From Communications of the ACM | November 1, 2012
Since the days of Alan Turing, the promise of a digital computer has been that of a universal machine, one that can be a word processor one minute and a robot brain...Forbes From ACM Opinion | October 23, 2012
So if Apple is really launching a 7.85in "iPad mini", how does that square with what Steve Jobs said two years ago?The Guardian From ACM Opinion | October 23, 2012
Defense secretary Leon Panetta couldn't resist, could he? He couldn't fight the urge to dig deep into the information security cliché handbook and yank out that...Threatpost From ACM Opinion | October 22, 2012
Over the years, Keith McCarthy has become used to a certain way of doing things on his personal computers, which, like most others on the planet, have long run...The New York Times From ACM Opinion | October 22, 2012
Destination Star Trek London has kicked off at the ExCeL exhibition centre, and I'm willing to bet that among those heading down for a weekend of pointy-eared fun...The Guardian From ACM Opinion | October 19, 2012
There's much to like about "This Machine Kills Secrets," Andy Greenberg's well-reported history of WikiLeaks and the many projects it has inspired, but one unintentionally...The New York Times From ACM Opinion | October 18, 2012
In late summer 2010, at the end of a morning briefing, one of President Obama's security advisers said, "Mr. President, Leon and the guys at Langley think they...NPR From ACM Opinion | October 16, 2012
One of the greatest benefits of 3D printing technology—the ability to make replacements or parts for household objects like toys, utensils and gadgets—may be denied...New Scientist From ACM Opinion | October 16, 2012
In the age of freely available modeling software, laser cutters and 3D printers, shapes that must stay secret for security's sake don't stay secret for long. Especially...Forbes From ACM Opinion | October 15, 2012
The Mykonos Vase, discovered in 1961 in the Cyclades, is one of the earliest accounts of the Trojan Horse, used as a subterfuge by the Greeks to enter the city...The New York Times From ACM Opinion | October 11, 2012
When discussing innovation, the Chinese like to tout the country’s "Four Great Inventions"—paper, gunpowder, the compass, and woodblock printing—and their enormous...Slate From ACM Opinion | October 10, 2012