Denial of service attacks—flooding Web sites with traffic in order to make them unavailable to the public—have become an increasingly popular way to take down or...Electronic Frontier Foundation From ACM Opinion | August 23, 2012
Wise experts and powerful machines are no match for chaotic events and human declarations. Beware of their predictions and be humble in your own.Peter J. Denning From Communications of the ACM | September 1, 2012
Seeking to improve the process for writing and reviewing proposals for new educational programs.Richard E. Ladner, Elizabeth Litzler From Communications of the ACM | September 1, 2012
Some thoughts about author order in research papers.Esperanza Marcos, Juan Manuel Vara, Valeria de Castro From Communications of the ACM | September 1, 2012
Two years ago, hackers gained access to an online voting system created by the District of Columbia and altered every ballot on behalf of their own preferred candidates...The Wall Street Journal From ACM Opinion | August 20, 2012
As Twitter and Facebook continue to fight a variety of skirmishes in the ongoing "platform wars," with both companies trying to control as much of their networks...GigaOm From ACM Opinion | August 14, 2012
Bruce Schneieer ordered a Coke, no ice, at the Rio casino on a Saturday afternoon. I ordered Diet Coke, also no ice, and handed the bartender an American Express...The New York Times From ACM Opinion | August 13, 2012
After being on the receiving end of a truly awful hacking attack, Wired writer Mat Honan explained how it happened in detail. And he was very clear about two of...GigaOm From ACM Opinion | August 9, 2012
Mat Honan, the technology reporter who was digitally disemboweled this past weekend, has revealed exactly how he was so spectacularly owned. His case, a cascade...Scientific American From ACM Opinion | August 8, 2012
Security researcher Dan Kaminsky believes rethinking the basic rules of computer science can dramatically improve computer security, and argues that "there's not...BYTE From ACM TechNews | August 7, 2012
A blackout in Manhattan. A major dam failure. Mayhem at a chemical plant. Those are all potential, and entirely plausible, consequences of a cyber attack, according...Time From ACM Opinion | August 7, 2012
The escalating dependence on drone pilots, as Maj. Dave Blair agonized in the May-June issue ofAir & Space Power Journal, is undercutting the ability to award combat...Slate From ACM Opinion | August 7, 2012
On November 5, 2009, an Army psychiatrist stationed at Fort Hood, Texas shot and killed 12 fellow soldiers and a civilian Defense Department employee while wounding...ArsTechnica From ACM News | August 3, 2012
Here is a look at some of the highlights and scarier happenings taking place at the annual Black Hat hacker conference in Las Vegas last week.The New York Times From ACM Opinion | July 30, 2012
A big part of Magistrate Judge Stephen W. Smith's job in Federal District Court in Houston is to consider law enforcement requests for cellphone and email records...The New York Times From ACM Opinion | July 26, 2012