acm-header
Sign In

Communications of the ACM

Recent Interviews


bg-corner

Apple CEO Tim Cook on Screen Time Controls, Working with China
From ACM Opinion

Apple CEO Tim Cook on Screen Time Controls, Working with China

Tim Cook, who has led Apple since 2011, spoke with NPR's Steve Inskeep in a wide-ranging interview on Monday as the company kicked off its annual Worldwide Developers...

This 'Gray Hat' Hacker Breaks Into Your Car, to Prove a Point
From ACM Opinion

This 'Gray Hat' Hacker Breaks Into Your Car, to Prove a Point

Cybercrime is expanding beyond computers and cellphones. Cars, washers and dryers, and even toasters are going online—an evolution of technology called the ...

The Father of the Internet Sees His Invention Reflected Back Through a 'Black Mirror'
From ACM Opinion

The Father of the Internet Sees His Invention Reflected Back Through a 'Black Mirror'

In 1984, two men were thinking a lot about the Internet. One of them invented it. The other is an artist who would see its impact on society with uncanny prescience...

FCC Chief Makes Case For Tackling Net Neutrality Violations 'after The Fact'
From ACM Opinion

FCC Chief Makes Case For Tackling Net Neutrality Violations 'after The Fact'

The Federal Communications Commission will vote on May 18 to formally begin the process of loosening regulations that enforce the so-called net neutrality rules...

President Trump's New Order Gives China Tech Opportunity To 'hire American' Too
From ACM Opinion

President Trump's New Order Gives China Tech Opportunity To 'hire American' Too

The same week that President Trump issued his hire American executive order, the president of one of China's top tech companies said his company wants to do the...

Despite Its Promise, the Internet of Things Remains Vulnerable
From ACM Opinion

Despite Its Promise, the Internet of Things Remains Vulnerable

More and more of the things we use every day are being connected to the Internet.

Documentary Explores The Cyber-War Secrets Of Stuxnet
From ACM Opinion

Documentary Explores The Cyber-War Secrets Of Stuxnet

Alex Gibney's new documentary, Zero Days, looks at the Stuxnet worm—a cyber weapon developed by the U.S. and Israel.

Why The Fbi Director Puts Tape Over His Webcam
From ACM Opinion

Why The Fbi Director Puts Tape Over His Webcam

FBI Director James Comey gave a speech this week about encryption and privacy, repeating his argument that "absolute privacy" hampers law enforcement. But it was...

Why Digital Security Is an 'arms Race' Between Firms and the Feds
From ACM Opinion

Why Digital Security Is an 'arms Race' Between Firms and the Feds

The Apple-FBI standoff, where Apple is refusing to write special software that would help investigators crack into an iPhone of one of the San Bernardino shooters...

The Cybersecurity Argument For and Against Device Encryption
From ACM Opinion

The Cybersecurity Argument For and Against Device Encryption

Government officials argue that encrypted communication poses national security risks. But tech companies say that making it possible to unlock devices would make...

Apple Ceo Tim Cook: 'privacy Is a Fundamental Human Right'
From ACM Opinion

Apple Ceo Tim Cook: 'privacy Is a Fundamental Human Right'

Apple has long touted the power and design of its devices, but recently the world's most valuable company has been emphasizing another feature: privacy.

How Close Are We Really to a Robot-Run Society?
From ACM Opinion

How Close Are We Really to a Robot-Run Society?

From Rosie, the Jetsons' robot maid, to Arnold Schwarzenegger's cyborg in The Terminator, popular culture has frequently conceived of robots as having a human-like...

Infiltrating 'the Dark Net,' Where Criminals, Trolls, and Extremists Reign
From ACM Opinion

Infiltrating 'the Dark Net,' Where Criminals, Trolls, and Extremists Reign

There's a side to the Internet most people have never visited.

Attention White-Collar Workers: The Robots Are Coming For Your Jobs
From ACM Opinion

Attention White-Collar Workers: The Robots Are Coming For Your Jobs

From the self-checkout aisle of the grocery store to the sports section of the newspaper, robots and computer software are increasingly taking the place of humans...

Sen. Ed Markey On Protecting Data Our Cars Are Sharing
From ACM Opinion

Sen. Ed Markey On Protecting Data Our Cars Are Sharing

Cars and trucks today are computers, and a new report overseen by Sen. Ed Markey, D-Mass., comes with a warning: As more vehicles have wireless connections, the...

How The Cold War And George Orwell Helped Make The Internet What It Is
From ACM Opinion

How The Cold War And George Orwell Helped Make The Internet What It Is

The story of how the digital age came to be involves a cast of more than 40 people, ranging from a 19th century English countess to California hippies.

Why Do We Blindly Sign Terms of Service Agreements?
From ACM Opinion

Why Do We Blindly Sign Terms of Service Agreements?

Audie Cornish talks with University of Chicago Law School professor Omri Ben-Shahar about terms of service agreements for software and websites.

Nsa Implementing Fix to Prevent Snowden-Like Security Breach
From ACM Opinion

Nsa Implementing Fix to Prevent Snowden-Like Security Breach

A year after Edward Snowden's digital heist, the NSA's chief technology officer says steps have been taken to stop future incidents. But he says there's no way...

The Hazards of Probing the Internet's Dark Side
From ACM Opinion

The Hazards of Probing the Internet's Dark Side

Late last year, hackers breached Target's data security and stole information from millions of credit cards.

While Warning of Chinese Cyberthreat, ­.s. Launches Its Own Attack
From ACM Opinion

While Warning of Chinese Cyberthreat, ­.s. Launches Its Own Attack

The U.S. government has long complained about Chinese hacking and cyberattacks, but new documents show that the National Security Agency managed to penetrate the...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account