acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

The Russians Will Be Back. Will We Be Ready?
From ACM Opinion

The Russians Will Be Back. Will We Be Ready?

In recent days, our nation's response to the continued threat of foreign meddling in American elections has taken something of a surprising turn.

Please Prove You're Not a Robot
From ACM Opinion

Please Prove You're Not a Robot

When science fiction writers first imagined robot invasions, the idea was that bots would become smart and powerful enough to take over the world by force, whether...

Why Haven't Reporters Mass-Adopted Secure Tools For Communicating With Sources?
From ACM Opinion

Why Haven't Reporters Mass-Adopted Secure Tools For Communicating With Sources?

In the months since Donald Trump took office, Washington has been leaking like a sieve.

Donald Trump's 'impenetrable Cybersecurity' Is Pure Fantasy
From ACM Opinion

Donald Trump's 'impenetrable Cybersecurity' Is Pure Fantasy

Nothing connected to the internet is safe from hackers. And I mean nothing.

AI Will Make Forging Anything Entirely Too Easy
From ACM Opinion

AI Will Make Forging Anything Entirely Too Easy

"Lordy, I hope there are tapes," said an exasperated James Comey in his testimony before the Senate Intelligence Committee on June 8. Comey's desire reflects a...

It's Too Late to Stop China from Becoming an AI Superpower
From ACM Opinion

It's Too Late to Stop China from Becoming an AI Superpower

Last Thursday, Texas senior senator John Cornyn stood before an audience of wonks at the Council on Foreign Relations in Washington, DC, and warned that America's...

The Iphone's Turning 10. What Will It Look Like at 20?
From ACM Opinion

The Iphone's Turning 10. What Will It Look Like at 20?

You wake up refreshed. Ever since you got that alarm clock that adapts to your sleep cycle, your calendar, and the traffic report, you practically leap out of bed...

Cryptovirology
From Communications of the ACM

Cryptovirology: The Birth, Neglect, and Explosion of Ransomware

Recent attacks exploiting a known vulnerability continue a downward spiral of ransomware-related incidents.

Building Privacy Right Into Software code
From ACM Opinion

Building Privacy Right Into Software code

When I was 15, my parents did not allow me to use AOL Instant Messenger. All of my friends used it, so I had to find a way around this rule.

Helping or Hacking? Engineers and Ethicists Must Work Together On brain-Computer interface Technology
From ACM Opinion

Helping or Hacking? Engineers and Ethicists Must Work Together On brain-Computer interface Technology

In the 1995 film "Batman Forever," the Riddler used 3-D television to secretly access viewers' most personal thoughts in his hunt for Batman's true identity.

The Latest Nsa Leak Is a Reminder that Your Bosses Can See Your Every Move
From ACM Opinion

The Latest Nsa Leak Is a Reminder that Your Bosses Can See Your Every Move

It took just days for authorities to arrest and charge a federal contractor with leaking classified intelligence to the media.

A Guide to Challenges Facing Self-Driving Car Technologists
From ACM Opinion

A Guide to Challenges Facing Self-Driving Car Technologists

In the minds of many in Silicon Valley and in the auto industry, it is inevitable that cars will eventually drive themselves.

Privacy in the Cellphone Age
From ACM Opinion

Privacy in the Cellphone Age

Odds are you need to use that phone in your pocket many times a day—and doing so leaves you no choice but to constantly relay data revealing your location and movements...

The Mysterious Printer Code That Could Have Led the Fbi to Reality Winner
From ACM Opinion

The Mysterious Printer Code That Could Have Led the Fbi to Reality Winner

Across the computer security world yesterday, heads were shaking.

Enigma: Why the Fight to Break Nazi Encryption Still Matters
From ACM News

Enigma: Why the Fight to Break Nazi Encryption Still Matters

It was night when three British sailors and a 16-year-old canteen assistant boarded a sinking U-boat off the coast of Egypt.

Why Apple Is Struggling to Become an Artificial-Intelligence Powerhouse
From ACM Opinion

Why Apple Is Struggling to Become an Artificial-Intelligence Powerhouse

In 2011, Apple became the first company to place artificial intelligence in the pockets of millions of consumers when it launched the voice assistant Siri on the...

To Make Your Conspiracy Theory Legit, Just Find an 'expert'
From ACM Opinion

To Make Your Conspiracy Theory Legit, Just Find an 'expert'

"MIT Professor Exposes 'Egregious Error' & Evidence Tampering in US Report on Syria Sarin Incident." Pretty good headline, right?

7 in 10 Smartphone Apps Share Your Data with Third-Party Services
From ACM Opinion

7 in 10 Smartphone Apps Share Your Data with Third-Party Services

Our mobile phones can reveal a lot about ourselves: where we live and work; who our family, friends and acquaintances are; how (and even what) we communicate with...

Who Are the Shadow Brokers?
From ACM Opinion

Who Are the Shadow Brokers?

In 2013, a mysterious group of hackers that calls itself the Shadow Brokers stole a few disks full of National Security Agency secrets.

Remaining Trouble Spots with Computational Thinking
From Communications of the ACM

Remaining Trouble Spots with Computational Thinking

Addressing unresolved questions concerning computational thinking.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account