The term cyberwar has become a catch-all used by politicians, talking heads and others to encompass just about any online threat, regardless of the attacker or...Threatpost From ACM Opinion | November 19, 2012
Since 1978, the Chinese economy has seen phenomenal growth. While that’s not in dispute, the reason why China has managed to grow so fast and whether it can maintain...Technology Review From ACM Opinion | November 19, 2012
In 1987, when Judge Robert Bork was enmeshed in a partisan struggle over his Supreme Court nomination, a reporter for an alternative weekly in Washington, D.C.,...ProPublica From ACM Opinion | November 19, 2012
Having an extramarital affair in 2012 is not an easy task if you’re the chief of the world’s most renowned spy agency.Slate From ACM Opinion | November 16, 2012
Tech has always played a prominent role in the Bond franchise; it's a key element of the plot formula: Bond opens with a chase scene, the core mission is revealed...The Atlantic From ACM Opinion | November 16, 2012
When Barack Obama was sworn in four years ago for his first term, there was genuine optimism that he would make meaningful improvements to the security of the nation's...Threatpost From ACM Opinion | November 8, 2012
Not long after I began writing about cybersecurity, I became a paranoid caricature of my former self.The New York Times From ACM Opinion | November 8, 2012
In late spring, the backroom number crunchers who powered Barack Obama's campaign to victory noticed that George Clooney had an almost gravitational tug on West...Time From ACM Opinion | November 7, 2012
I learned with disbelief last Monday about the decision of an Italian judge to convict seven scientific experts of manslaughter and to sentence them to six years...The New York Times From ACM Opinion | October 29, 2012
If you are wondering who will be your cellphone provider next year, so are the cellphone companies.The New York Times From ACM Opinion | October 25, 2012
In a Monday article, we described the security and reliability problems that have undermined public confidence in electronic voting machines within the United States...ArsTechnica From ACM Opinion | October 25, 2012
The FBI recently put out a mobile malware alert, providing us with a sobering reminder of this "evil software" for phones and tablets.Wired From ACM Opinion | October 25, 2012
Last week, a congressional report claimed that using Chinese telecommunications companies’ goods and services in the United States could threaten national security...Slate From ACM Opinion | October 24, 2012
Seeking solutions to concerns that go beyond the engineering of the smart grid.Timothy Kostyk, Joseph Herkert From Communications of the ACM | November 1, 2012
A multipronged approach to preparing computer science teachers is critical to success.Aman Yadav, John T. Korb From Communications of the ACM | November 1, 2012