The Internet is often seen as a place of chaos and disorder, a borderless world in which anonymous trolls roam free and vigilante hackers wreak havoc.Slate From ACM Opinion | November 29, 2012
The notion of the United Nations making the rules and governing the Internet should send shivers down the spine of anyone who uses a cell phone, laptop or search...The San Jose Mercury News From ACM Opinion | November 29, 2012
Google's driver-less cars are already street-legal in three states, California, Florida, and Nevada, and some day similar devices may not just be possible but mandatory...The New Yorker From ACM Opinion | November 27, 2012
Okay, great: we can control our phones with speech recognition and our television sets with gesture recognition.Scientific American From ACM Opinion | November 26, 2012
The term cyberwar has become a catch-all used by politicians, talking heads and others to encompass just about any online threat, regardless of the attacker or...Threatpost From ACM Opinion | November 19, 2012
In 1987, when Judge Robert Bork was enmeshed in a partisan struggle over his Supreme Court nomination, a reporter for an alternative weekly in Washington, D.C.,...ProPublica From ACM Opinion | November 19, 2012
Having an extramarital affair in 2012 is not an easy task if you’re the chief of the world’s most renowned spy agency.Slate From ACM Opinion | November 16, 2012
Tech has always played a prominent role in the Bond franchise; it's a key element of the plot formula: Bond opens with a chase scene, the core mission is revealed...The Atlantic From ACM Opinion | November 16, 2012
Security experts are pushing back against what they see as alarmist rhetoric from U.S. Department of Homeland Security secretary Janet Napolitano and Department...CSO Online From ACM TechNews | November 8, 2012
When Barack Obama was sworn in four years ago for his first term, there was genuine optimism that he would make meaningful improvements to the security of the nation's...Threatpost From ACM Opinion | November 8, 2012
Not long after I began writing about cybersecurity, I became a paranoid caricature of my former self.The New York Times From ACM Opinion | November 8, 2012
In a Monday article, we described the security and reliability problems that have undermined public confidence in electronic voting machines within the United States...ArsTechnica From ACM Opinion | October 25, 2012
The FBI recently put out a mobile malware alert, providing us with a sobering reminder of this "evil software" for phones and tablets.Wired From ACM Opinion | October 25, 2012
Seeking solutions to concerns that go beyond the engineering of the smart grid.Timothy Kostyk, Joseph Herkert From Communications of the ACM | November 1, 2012
A multipronged approach to preparing computer science teachers is critical to success.Aman Yadav, John T. Korb From Communications of the ACM | November 1, 2012
Assessing the first phase of the trial based on claims that Google's Android platform infringes Oracle's Java-related copyrights and patents.
Pamela Samuelson From Communications of the ACM | November 1, 2012
Security research can be improved by more effectively sharing what is learned from attacks on information systems.David Basin, Srdjan Capkun From Communications of the ACM | November 1, 2012