There is a growing sentiment among security researchers that the programmers behind the Stuxnet attack may not have been the super-elite cadre of developers that...Threat Post From ACM Opinion | January 19, 2011
High-frequency trading networks, which complete stock market transactions in microseconds, are vulnerable to manipulation by hackers who can inject tiny amounts...InfoWorld From ACM News | January 7, 2011
As in the real world, cyberspace has bad neighborhoods. But unlike the real world, risks in cyberspace are not easy to spot—and the location of those digital...MSNBC From ACM Opinion | December 29, 2010
Seeking to improve the educational mechanisms for efficiently training large numbers of information security workers.Michael E. Locasto, Anup K. Ghosh, Sushil Jajodia, Angelos Stavrou From Communications of the ACM | January 1, 2011
Privacy and confidentiality issues in cloud-based conference management systems reflect more universal themes.Mark D. Ryan From Communications of the ACM | January 1, 2011
You want to know how to get my attention?" Jason Kalich asked the audience rhetorically. "First off, don't bring me a good...Phillip G. Armour From Communications of the ACM | January 1, 2011
The easiest way to sum up the Web in 2010 is that it was a year of growth. The big got bigger and smaller companies came out of the woodwork with new plays on...CNET From ACM News | December 21, 2010
In May 2009, The Daily Telegraph set off a political storm in Britain when it detailed widespread expense-account abuse by members of Parliament. Among the claims...The New York Times From ACM Opinion | December 20, 2010
I recently wrote a white paper entitled “Dragons, Tigers, Pearls, and Yellowcake” in which I proposed four alternative scenarios for the Stuxnet worm other than...Forbes From ACM Opinion | December 17, 2010
As faculty members and officers of the Columbia University Graduate School of Journalism, we are concerned by recent reports that the Department of Justice is...Columbia niversity Graduate School of Journalism From ACM News | December 15, 2010
Just as the First Amendment is not a license to yell 'Fire!' in a crowded theater, it is also not a license to jeopardize national security.The Wall Street Journal From ACM Opinion | December 13, 2010
"I'm aware of your need to stay anonymous, but I have to be able to describe the scope of this movement. Can any of you tell me where you're typing from?"The Economist From ACM Opinion | December 10, 2010
A truly free press—one unfettered by concerns of nationalism—is apparently a terrifying problem for elected governments and tyrannies alike.Wired From ACM Opinion | December 7, 2010
"Secrecy is important for many things," said WikiLeaks founder Julian Assange in an interview with Time over Skype on Monday. Managing editor Richard Stengel...Time From ACM Opinion | December 1, 2010
The increasing volume of research data highlights the need for reliable, cost-effective data storage and preservation at the national scale.Francine Berman From Communications of the ACM | December 1, 2010
While it is true that "programmers aren't English majors," there are many days that I wish they were, or that...George V. Neville-Neil From Communications of the ACM | December 1, 2010