acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

How Flame Virus Has Changed Everything For Online Security Firms
From ACM Opinion

How Flame Virus Has Changed Everything For Online Security Firms

Here's a question: if you connect an unprotected Windows computer to the Internet, how long will it take before it is infected by malicious software?

What Have We Learned: Flame Malware
From ACM Opinion

What Have We Learned: Flame Malware

When the news about the Flame malware first broke several weeks ago, people from all parts of the security community, political world and elsewhere quickly began...

The Vulnerabilities Market and the Future of Security
From ACM Opinion

The Vulnerabilities Market and the Future of Security

Recently, there have been several articles about the new market in zero-day exploits: new and unpatched computer vulnerabilities. It's not just software companies...

World's Largest Organization For Computer Professionals Comes Out Against Cispa
From ACM Opinion

World's Largest Organization For Computer Professionals Comes Out Against Cispa

The U.S. Public Policy Council of the Association of Computing Machinery, representing ACM, came out against CISPA, the cybersecurity legislation recently passed...

Google Fights Back in China
From ACM News

Google Fights Back in China

Two giants on the world stage are battling over the future of information.

Is Flame Virus Fallout a Chinese, Russian Plot to Control the Internet?
From ACM Opinion

Is Flame Virus Fallout a Chinese, Russian Plot to Control the Internet?

Has the U.S. government been caught with its virtual hands in the world's cookie jar? And might it lose control of the Internet as a consequence?

From ACM Opinion

Drones, Computer Viruses, and Blowback

Another day, another senior al-Qaeda leader killed by a drone strike. (I can't be the first to point out that being al-Qaeda's No. 2 is like being the drummer for...

From ACM Opinion

Cyberweapons: Bold Steps in a Digital Darkness?

In 1945, the United States organized a committee to investigate whether nuclear weapons should become a central military technology, or whether to abjure the weapons...

Are We Living in Bradbury's Fahrenheit 451?
From ACM Opinion

Are We Living in Bradbury's Fahrenheit 451?

Science-fiction author Ray Bradbury, one of the world's leading writers of the genre for more than 60 years, died on Wednesday at the age of 91. Although he wrote...

Is It Possible to Wage a Just Cyberwar?
From ACM Opinion

Is It Possible to Wage a Just Cyberwar?

In the last week or so, cyberwarfare has made front-page news: the United States may have been behind the Stuxnet cyberattack on Iran; Iran may have suffered another...

Why Attack When We Can't Defend?
From ACM Opinion

Why Attack When We Can't Defend?

In December 2010, after we had reverse engineered the Stuxnet virus, I argued that the attackers must have known they would open Pandora's box. Others suggested...

Why Antivirus Companies Like Mine Failed to Catch Flame and Stuxnet
From ACM Opinion

Why Antivirus Companies Like Mine Failed to Catch Flame and Stuxnet

A couple of days ago, I received an e-mail from Iran. It was sent by an analyst from the Iranian Computer Emergency Response Team, and it was informing me about...

Apple's Crystal Prison and the Future of Open Platforms
From ACM Opinion

Apple's Crystal Prison and the Future of Open Platforms

Two weeks ago, Steve Wozniak made a public call for Apple to open its platforms for those who wish to tinker, tweak and innovate with their internals. EFF supports...

What Fearmongers Get Wrong About Cyberwarfare
From ACM Opinion

What Fearmongers Get Wrong About Cyberwarfare

Should we worry about cyberwarfare? Judging by excessively dramatic headlines in the media, very much so. Cyberwarfare, the argument goes, might make wars easier...

From ACM Opinion

What's the Meaning of This: Flame Malware

From all indications, it would appear that attackers are continuing to attack and malware authors are carrying on writing malware.

A Measure of Control
From Communications of the ACM

A Measure of Control

Some limitations on measurements in software.

The Cybersecurity Risk
From Communications of the ACM

The Cybersecurity Risk

Increased attention to cybersecurity has not resulted in improved cybersecurity.

Scale Failure
From Communications of the ACM

Scale Failure

Using a tool for the wrong job is OK until the day when it isn't.

Security of the Internet and the Known Unknowns
From Communications of the ACM

Security of the Internet and the Known Unknowns

Seeking answers to questions about Internet vulnerabilities.

The Myth of the Elevator Pitch
From Communications of the ACM

The Myth of the Elevator Pitch

Instead of pitching, listen and offer.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account