A proposal for a framework for code requirements addressing primary sources of vulnerabilities for building systems.Carl Landwehr From Communications of the ACM | February 1, 2015
During one scene in the upcoming hacker action movie Blackhat, a team is sent into the control room of a burned-out nuclear power plant to gather clues about the...Ars Technica From ACM Opinion | January 16, 2015
Ross Ulbricht is finally getting his day in court, 15 months after plainclothes FBI agents grabbed him in the science fiction section of a San Francisco library...Wired From ACM Opinion | January 13, 2015
One of the best Twitter accounts inside the Beltway or out—belongs to former representativeJohn Dingell (D-Mich.), who announced his retirement with self-effacing...The Washington Post From ACM Opinion | January 12, 2015
Dynamic scoring, as adopted on Jan. 6 by the House of Representatives, seems like the ultimate no-brainer.Bloomberg Businessweek From ACM Opinion | January 8, 2015
Roughly a year and a half since the first Snowden disclosures, there's already been a judicial order to shut down the National Security Agency's bulk metadata collection...Ars Technica From ACM Opinion | January 5, 2015
As the clock strikes midnight on the new year, so begins the countdown to a new round of security threats and breaches that doubtless will unfold in 2015. But this...Wired From ACM Opinion | January 5, 2015
The Turing Award gives us a unique opportunity to become ambassadors of our wonderful field. It increases our outside visibility and enables us to build bridges...Silvio Micali From Communications of the ACM | January 1, 2015