Earlier this week the U.S. Department of Justice indicted five Chinese military officers for industrial espionage, accusing them of leading attacks on the computers...Technology Review From ACM Opinion | May 23, 2014
Artificial intelligence is guided by the far-off goal of having software match humans at important tasks.Technology Review From ACM Opinion | May 21, 2014
Since Edward Snowden's revelations about government surveillence, we know more about how the National Security Agency has been interpreting Section 215 of the Patriot...The New Yorker From ACM Opinion | May 16, 2014
Recently retired director of the U.S. National Security Agency and commander of the U.S. Cyber Command General Keith Alexander was interviewed by Australian Financial...The Australian Financial Review From ACM Opinion | May 8, 2014
If the so-called Internet of Things ever becomes one of those proverbial next big things in technology, Thomas Lee, a card-carrying member of the cohort of big...CNET From ACM Opinion | May 8, 2014
A major, global cyberterrorist attack has long been the stuff of fiction, the threat that a malevolent hacker could bring down businesses, sabotage power plants...The Guardian From ACM Opinion | May 5, 2014
Flash Boys explores the world of high-frequency trading, a scheme in which traders use ultra-fast network connections to sniff out the intentions of other, slower...Wired From ACM Opinion | April 22, 2014
The developer who introduced the "Heartbleed" vulnerability to the open-source code used by thousands of websites has told the Guardian it was an "oversight"—but...The Guardian From ACM Opinion | April 11, 2014
The Moscow-based computer security firm Kaspersky Lab has analyzed major new kinds of malware, including Stuxnet, which four years ago was revealed to have damaged...Technology Review From ACM Opinion | April 11, 2014
When he was in elementary school, Scott Aaronson, like many mathematically precocious kids of his generation, dreamed of making his own video games.MIT News Office From ACM Opinion | April 7, 2014
A small group of financial firms are using their technological superiority to skim the top off the market, Michael Lewis claims in his new book "Flash Boys."The Washington Post From ACM Opinion | April 7, 2014
The Internet of Things has tremendous potential but also poses a tremendous risk if the underlying security of Internet of Things devices is not taken into account...The Security Ledger From ACM Opinion | April 3, 2014
The U.S. government has long complained about Chinese hacking and cyberattacks, but new documents show that the National Security Agency managed to penetrate the...NPR From ACM Opinion | April 3, 2014
Caltech Professor of Physics Jamie Bock and his collaborators announced on March 17, 2014 that they have successfully measured a B-mode polarization signal in the...Caltech News From ACM Opinion | March 20, 2014
This year's winner of the Turing Award—often referred to as the Nobel Prize of computing—was announced yesterday as Leslie Lamport, a computer scientist whose research...Technology Review From ACM Opinion | March 19, 2014
When Jeremy Drake was beginning his career in the late 1980s, the question of whether or not we are alone in the universe still seemed beyond the realm of scienc...Smithsonian magazine From ACM Opinion | March 17, 2014
Let's start with one thing you hear over and over again when interviewing people about privacy: "I've got nothing to hide."Popular Mechanics From ACM Opinion | March 10, 2014
On Friday, what had been the world's leading Bitcoin exchange declared bankrutpcy, claiming that hackers had exploited a technical issue called "transaction malleability...The Washington Post From ACM Opinion | March 3, 2014