acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

From ACM News

Back to Stuxnet: The Missing Link

Two weeks ago, when we announced the discovery of the Flame malware we said that we saw no strong similarity between its code and programming style with that of ...

How To Fix the Gender Gap in Technology
From ACM Opinion

How To Fix the Gender Gap in Technology

The United States has produced viable female presidential candidates, women athletes who command millions of dollars in endorsements, and the first female Nobel...

From ACM Opinion

Drones, Computer Viruses, and Blowback

Another day, another senior al-Qaeda leader killed by a drone strike. (I can't be the first to point out that being al-Qaeda's No. 2 is like being the drummer for...

From ACM Opinion

Cyberweapons: Bold Steps in a Digital Darkness?

In 1945, the United States organized a committee to investigate whether nuclear weapons should become a central military technology, or whether to abjure the weapons...

Bionic Brains and Beyond
From ACM News

Bionic Brains and Beyond

The National Spelling Bee of 2023 started out like any other, but controversy enveloped the contest when Suzy Hamilton, an 8-year-old from Tulsa, emerged as the...

Are We Living in Bradbury's Fahrenheit 451?
From ACM Opinion

Are We Living in Bradbury's Fahrenheit 451?

Science-fiction author Ray Bradbury, one of the world's leading writers of the genre for more than 60 years, died on Wednesday at the age of 91. Although he wrote...

Is It Possible to Wage a Just Cyberwar?
From ACM Opinion

Is It Possible to Wage a Just Cyberwar?

In the last week or so, cyberwarfare has made front-page news: the United States may have been behind the Stuxnet cyberattack on Iran; Iran may have suffered another...

Why Attack When We Can't Defend?
From ACM Opinion

Why Attack When We Can't Defend?

In December 2010, after we had reverse engineered the Stuxnet virus, I argued that the attackers must have known they would open Pandora's box. Others suggested...

Can America Ever Have Another 'sputnik Moment'?
From ACM Opinion

Can America Ever Have Another 'sputnik Moment'?

In his 2011 State of the Union Address, President Obama declared, "This is our generation's Sputnik moment." Sputnik was the satellite that the Soviets had launched...

Why Antivirus Companies Like Mine Failed to Catch Flame and Stuxnet
From ACM Opinion

Why Antivirus Companies Like Mine Failed to Catch Flame and Stuxnet

A couple of days ago, I received an e-mail from Iran. It was sent by an analyst from the Iranian Computer Emergency Response Team, and it was informing me about...

From ACM Opinion

Augmented Reality Offers a New Layer of Intrigue

If you ever come across a photograph of communist-era East Berlin, or modern Pyongyang in North Korea, the cityscapes look drab and featureless. Billboards, advertising...

What Fearmongers Get Wrong About Cyberwarfare
From ACM Opinion

What Fearmongers Get Wrong About Cyberwarfare

Should we worry about cyberwarfare? Judging by excessively dramatic headlines in the media, very much so. Cyberwarfare, the argument goes, might make wars easier...

From ACM Opinion

What's the Meaning of This: Flame Malware

From all indications, it would appear that attackers are continuing to attack and malware authors are carrying on writing malware.

The Remote Control as Subversive Technology
From ACM Opinion

The Remote Control as Subversive Technology

Television began as a box.

A Measure of Control
From Communications of the ACM

A Measure of Control

Some limitations on measurements in software.

The Cybersecurity Risk
From Communications of the ACM

The Cybersecurity Risk

Increased attention to cybersecurity has not resulted in improved cybersecurity.

Scale Failure
From Communications of the ACM

Scale Failure

Using a tool for the wrong job is OK until the day when it isn't.

Security of the Internet and the Known Unknowns
From Communications of the ACM

Security of the Internet and the Known Unknowns

Seeking answers to questions about Internet vulnerabilities.

The Myth of the Elevator Pitch
From Communications of the ACM

The Myth of the Elevator Pitch

Instead of pitching, listen and offer.

Why Computer Scientists Should Care About Cyber Conflict and U.S. National Security Policy
From Communications of the ACM

Why Computer Scientists Should Care About Cyber Conflict and U.S. National Security Policy

Cybersecurity and policy issues for computer scientists.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account