In 1987, when Judge Robert Bork was enmeshed in a partisan struggle over his Supreme Court nomination, a reporter for an alternative weekly in Washington, D.C.,...ProPublica From ACM Opinion | November 19, 2012
Having an extramarital affair in 2012 is not an easy task if you’re the chief of the world’s most renowned spy agency.Slate From ACM Opinion | November 16, 2012
Tech has always played a prominent role in the Bond franchise; it's a key element of the plot formula: Bond opens with a chase scene, the core mission is revealed...The Atlantic From ACM Opinion | November 16, 2012
Security experts are pushing back against what they see as alarmist rhetoric from U.S. Department of Homeland Security secretary Janet Napolitano and Department...CSO Online From ACM TechNews | November 8, 2012
When Barack Obama was sworn in four years ago for his first term, there was genuine optimism that he would make meaningful improvements to the security of the nation's...Threatpost From ACM Opinion | November 8, 2012
Not long after I began writing about cybersecurity, I became a paranoid caricature of my former self.The New York Times From ACM Opinion | November 8, 2012
In a Monday article, we described the security and reliability problems that have undermined public confidence in electronic voting machines within the United States...ArsTechnica From ACM Opinion | October 25, 2012
The FBI recently put out a mobile malware alert, providing us with a sobering reminder of this "evil software" for phones and tablets.Wired From ACM Opinion | October 25, 2012
Seeking solutions to concerns that go beyond the engineering of the smart grid.Timothy Kostyk, Joseph Herkert From Communications of the ACM | November 1, 2012
A multipronged approach to preparing computer science teachers is critical to success.Aman Yadav, John T. Korb From Communications of the ACM | November 1, 2012
Assessing the first phase of the trial based on claims that Google's Android platform infringes Oracle's Java-related copyrights and patents.
Pamela Samuelson From Communications of the ACM | November 1, 2012
Security research can be improved by more effectively sharing what is learned from attacks on information systems.David Basin, Srdjan Capkun From Communications of the ACM | November 1, 2012
Since the days of Alan Turing, the promise of a digital computer has been that of a universal machine, one that can be a word processor one minute and a robot brain...Forbes From ACM Opinion | October 23, 2012
Defense secretary Leon Panetta couldn't resist, could he? He couldn't fight the urge to dig deep into the information security cliché handbook and yank out that...Threatpost From ACM Opinion | October 22, 2012
There's much to like about "This Machine Kills Secrets," Andy Greenberg's well-reported history of WikiLeaks and the many projects it has inspired, but one unintentionally...The New York Times From ACM Opinion | October 18, 2012
Although academic fields will often enjoy more than Andy Warhol's famous 15 minutes of fame, they too are subject to today's ever-hungry machinery of hype. Like...Slate From ACM Opinion | October 17, 2012
In late summer 2010, at the end of a morning briefing, one of President Obama's security advisers said, "Mr. President, Leon and the guys at Langley think they...NPR From ACM Opinion | October 16, 2012