That little iPhone in your pocket is perfectly positioned to become a clone of the credit cards in your wallet or purse.The New York Times From ACM News | June 12, 2012
Has the U.S. government been caught with its virtual hands in the world's cookie jar? And might it lose control of the Internet as a consequence?MSNBC From ACM Opinion | June 12, 2012
Two weeks ago, when we announced the discovery of the Flame malware we said that we saw no strong similarity between its code and programming style with that of ...Kaspersky Lab From ACM News | June 11, 2012
Another day, another senior al-Qaeda leader killed by a drone strike. (I can't be the first to point out that being al-Qaeda's No. 2 is like being the drummer for...Time From ACM Opinion | June 9, 2012
In 1945, the United States organized a committee to investigate whether nuclear weapons should become a central military technology, or whether to abjure the weapons...Bulletin of the Atomic Scientists From ACM Opinion | June 8, 2012
Despite the massive amounts of computing power dedicated by search engine companies to crawling and indexing trillions of documents on the Internet, search engines...Arstechnica From ACM Opinion | June 8, 2012
In the last week or so, cyberwarfare has made front-page news: the United States may have been behind the Stuxnet cyberattack on Iran; Iran may have suffered another...The Atlantic From ACM Opinion | June 6, 2012
In December 2010, after we had reverse engineered the Stuxnet virus, I argued that the attackers must have known they would open Pandora's box. Others suggested...The New York Times From ACM Opinion | June 6, 2012
Until recently, the idea of holding a conversation with a computer seemed pure science fiction. If you asked a computer to "open the pod bay doors"—well, that was...Technology Review From ACM Opinion | June 5, 2012
A couple of days ago, I received an e-mail from Iran. It was sent by an analyst from the Iranian Computer Emergency Response Team, and it was informing me about...Wired From ACM Opinion | June 1, 2012
If you ever come across a photograph of communist-era East Berlin, or modern Pyongyang in North Korea, the cityscapes look drab and featureless. Billboards, advertising...New Scientist From ACM Opinion | May 30, 2012
Two weeks ago, Steve Wozniak made a public call for Apple to open its platforms for those who wish to tinker, tweak and innovate with their internals. EFF supports...Electronic Frontier Foundation From ACM Opinion | May 30, 2012
Should we worry about cyberwarfare? Judging by excessively dramatic headlines in the media, very much so. Cyberwarfare, the argument goes, might make wars easier...Slate From ACM Opinion | May 29, 2012
If you write about genetics and evolution, one of the commonest questions you are likely to be asked at public events is whether human evolution has stopped.The Wall Street Journal From ACM Opinion | May 29, 2012
From all indications, it would appear that attackers are continuing to attack and malware authors are carrying on writing malware.Threatpost From ACM Opinion | May 29, 2012
In the days of the Internet bubble of the mid to late 1990s, companies received millions of dollars of venture capital to offer products that weren't especially...Bloomberg Businessweek From ACM Opinion | May 24, 2012