From Newt Gingrich to a Congressional "EMP Caucus," some conservatives warn the electronics-frying blast could pose gravely underestimated dangers to the U.S.The Atlantic From ACM Opinion | July 18, 2011
MySpace fell from grace for several reasons. First, they sacrificed the service's integrity in pursuit of monetization. For those who remember, the user experience...Time From ACM Opinion | July 18, 2011
The nation’s second-ranking military official said Thursday that the U.S. approach to protecting its computer systems was "too predictable" and failed to penalize...The Washington Post From ACM News | July 15, 2011
In a speech at the International Economic Association 16th World Congress in Beijing, Andrew Haldane, Executive Director for Financial Stability and member of...Bank of England From ACM News | July 13, 2011
The United States may seriously want to consider creating a new Internet infrastructure to reduce the threat of cyberattacks, said Michael Hayden, President George...NextGov From ACM News | July 12, 2011
The history of Internet security is both worrisome and instructive. When the first virus — the "Morris worm"—was launched in 1988, the Internet was a closed system...The Washington Post From ACM Opinion | July 11, 2011
The Supreme Court ended its term with a high-profile ruling that violent video games are protected by the First Amendment, but a bigger technology decision could...Time From ACM News | July 11, 2011
Your computer, your phone, and your other digital devices hold vast amounts of personal information about you and your family. Can police officers enter your...Electronic Frontier Foundation From ACM News | June 27, 2011
After just 50 days, the group said it was ceasing individual operations. Why, when you might have thought things were going so well?The Guardian From ACM Opinion | June 27, 2011
For several months, EFF has been following the movement around Bitcoin, an electronic payment system that touts itself as "the first decentralized digital currency...Electronic Frontier Foundation From ACM Opinion | June 23, 2011
Viewing computer science in a broader context to dispel common misperceptions and provide more accurate guidance to students who are...Mordechai (Moti) Ben-Ari From Communications of the ACM | July 1, 2011
Addressing the challenges of increasing the number of women of color in computing and ensuring their success.Maria (Mia) Ong From Communications of the ACM | July 1, 2011
Reinstituting formalities — notice of copyright claims and registration requirements — could help address problems related to too many copyrights that last for...Pamela Samuelson From Communications of the ACM | July 1, 2011
Focusing on socio-technical design with values as a critical component in the design process.Cory Knobel, Geoffrey C. Bowker From Communications of the ACM | July 1, 2011
Supply chains are increasingly global. We pour energy into managing them efficiently, with their risks and rewards...Mari Sako From Communications of the ACM | July 1, 2011
In justifying U.S. involvement in Libya, the Obama administration cited the "responsibility to protect" citizens of other countries when their governments engage...The Wall Street Journal From ACM Opinion | June 20, 2011
Malware authors move fast. Following on from the previous blog post on Bitcoin botnet mining, we have seen a recent Trojan in the wild targeting Bitcoin wallets...Symantec From ACM News | June 17, 2011