acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

From ACM Opinion

Googling You

The settlement last week between a group of state attorneys general and Google over the company’s improper data collection from home wireless networks shows the...

Why We'll Never Make an ­npickable Lock
From ACM Opinion

Why We'll Never Make an ­npickable Lock

It would be roughly accurate to say that there have been locks as long as there have been things humans wanted to guard.

From 'wargames' to Aaron Swartz: How ­.s. Anti-Hacking Law Went Astray
From ACM Opinion

From 'wargames' to Aaron Swartz: How ­.s. Anti-Hacking Law Went Astray

Aaron Swartz, the Internet activist who committed suicide while facing the possibility of a felony criminal conviction, was prosecuted under a law that was never...

Can Your Boss Read Your Email?
From ACM Opinion

Can Your Boss Read Your Email?

Harvard faculty members responded with shock after the Boston Globe revealed that theuniversity’s administration had searched 16 faculty deans’ email accounts to...

Everything We Know About What Data Brokers Know About You
From ACM News

Everything We Know About What Data Brokers Know About You

Data companies are scooping up enormous amounts of information about almost every American. They sell information about whether you're pregnant or divorced or trying...

Google Glass: Is It a Threat to Our Privacy?
From ACM Opinion

Google Glass: Is It a Threat to Our Privacy?

If you haven't heard about the excitement around Google Glass—the head-mounted glasses that can shoot video, take pictures, and broadcast what you're seeing to...

6 Things I Want to Do with Nfc
From ACM Opinion

6 Things I Want to Do with Nfc

Tapping your phone on a console to pay for fries and a Coke is cool. Yet until the stars align, it's not how you'll be using NFC, the Near Field Communications...

From ACM Opinion

Shedding More Light on National Security Letters

Our users trust Google with a lot of very important data, whether it’s emails, photos, documents, posts or videos.

Are We Really Facing Cyberwar?
From ACM Opinion

Are We Really Facing Cyberwar?

A few weeks ago I was standing by a railway track in the small town of Gaithersburg in Maryland as a CSX freight train blasted through the level crossing; its horn...

Eye-Tracking Smartphones Have Arrived. What About the Privacy Implications?
From ACM Opinion

Eye-Tracking Smartphones Have Arrived. What About the Privacy Implications?

Last March, I wrote in Slate about eye-tracking, which could allow computers and smartphones of the future to collect information not only about what we read, but...

Computer Interfaces: Tech's Next Great Frontier
From ACM Opinion

Computer Interfaces: Tech's Next Great Frontier

Consider the tongue. It's sensitive yet muscular, packed with taste buds and nerves, and without its acrobatic ability humans wouldn’t be able to eat or talk. It's...

What to Do After You've Been Hacked
From ACM Opinion

What to Do After You've Been Hacked

Evernote became the latest member of the "we’ve been hacked" club. And the thing is, what was once a pretty exclusive club now lets just about everyone in these...

Why Teens Are Tiring of Facebook
From ACM Opinion

Why Teens Are Tiring of Facebook

To understand where teens like to spend their virtual time nowadways, just watch them on their smartphones.

Boing Boing's Cory Doctorow on 'homeland,' Printed Guns, and Heart Hacking
From ACM Opinion

Boing Boing's Cory Doctorow on 'homeland,' Printed Guns, and Heart Hacking

I had the pleasure of spending some time with Cory Doctorow on Feb. 25 at the Jefferson Hotel here in the nation's capital.

On Today's Battlefield, Is Information More Important Than Firepower?
From ACM Opinion

On Today's Battlefield, Is Information More Important Than Firepower?

Halo, Borderlands, Call of Duty, Medal of Honor, Battlefield, Metal Gear Solid—these kinds of games taught a generation to see enemies as red dots on a mini-map...

Review: Strong Passwords and Other Security Tips
From ACM Opinion

Review: Strong Passwords and Other Security Tips

Rarely does a week go by without news of another hacking incident, whether it's Chinese hackers accused of breaking in to The New York Times' computer systems or...

The Art of Cyberwar
From ACM Opinion

The Art of Cyberwar

The New York Times’ front-page report last week that the Chinese army is hacking into America's most sensitive computer networks from a 12-story building outside...

What China's Hackers Get Wrong About Washington
From ACM Opinion

What China's Hackers Get Wrong About Washington

"Start asking security experts which powerful Washington institutions have been penetrated by Chinese cyberspies," report my colleagues Craig Timberg and Ellen...

Calling Out the Robocaller
From ACM Opinion

Calling Out the Robocaller

Last month, the Haggler was sitting at home when the phone rang.

The Mystery of Google Street View's Blurred Brooklyn Brownstone
From ACM Opinion

The Mystery of Google Street View's Blurred Brooklyn Brownstone

We've all had shifty neighbors.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account