acm-header
Sign In

Communications of the ACM

Recent Interviews


bg-corner

Cyber and Drone Attacks May Change Warfare More Than the Machine Gun
From ACM Opinion

Cyber and Drone Attacks May Change Warfare More Than the Machine Gun

From state-sponsored cyberattacks to autonomous robotic weapons, 21st century war is increasingly disembodied.

The Philosopher Whose Fingerprints Are All Over the Ftc's New Approach to Privacy
From ACM Opinion

The Philosopher Whose Fingerprints Are All Over the Ftc's New Approach to Privacy

A mile or two away from Facebook's headquarters in Silicon Valley, Helen Nissenbaum of New York University was standing in a basement on Stanford's campus explaining...

Richard Clarke on Who Was Behind the Stuxnet Attack
From ACM News

Richard Clarke on Who Was Behind the Stuxnet Attack

The story Richard Clarke spins has all the suspense of a postmodern geopolitical thriller.

Rebecca Mackinnon Discusses Threats to Internet Freedom: Part 1
From ACM News

Rebecca Mackinnon Discusses Threats to Internet Freedom: Part 1

Rebecca MacKinnon shares insights about Internet freedom, including the roles and responsibilities of citizens, corporations, and governments.  

From ACM Opinion

The Coming Entanglement: Bill Joy and Danny Hillis

Digital innovators Bill Joy, co-founder of Sun Microsystems, and Danny Hillis, co-founder of the Long Now Foundation, talk with Scientific American Executive Editor...

Web Privacy Standards: Easy to Break, Hard to Enforce
From ACM Opinion

Web Privacy Standards: Easy to Break, Hard to Enforce

Over the past week, Google has been called out for bypassing default privacy settings in both Safari and Internet Explorer in order to serve up advertising cookies...

Q&A: Chief Strategiest
From Communications of the ACM

Q&A: Chief Strategiest

ACM CEO John White talks about initiatives to serve the organization's professional members, increase international activities, and reform computer science education...

A Discussion With David Farber: Bandwidth, Cyber Security, and the Obsolescence of the Internet
From ACM TechNews

A Discussion With David Farber: Bandwidth, Cyber Security, and the Obsolescence of the Internet

Internet technology veteran David Farber projects that within a decade, computers will be outfitted with optical connections rather than pins for networking, and...

Why America's Spies Struggle To Keep ­p
From ACM Opinion

Why America's Spies Struggle To Keep ­p

Before Sept. 11, 2011, there were 16 intelligence agencies in the United States.

Stephen Hawking's New Pc
From ACM Opinion

Stephen Hawking's New Pc

Intel application engineer Travis Bonifield has been working closely with Hawking to communicate with the world for a decade.

Infosec Careers: The New Demands
From ACM Careers

Infosec Careers: The New Demands

A major goal for information security students and institutions should be developing a cultural way of learning, instead of simply studying for tests and doing...

Carrier Iq Gets Transparent About Its Mobile Monitoring
From ACM Opinion

Carrier Iq Gets Transparent About Its Mobile Monitoring

It's been a tumultuous few weeks for Carrier IQ, the mobile analytics outfit at the center of a continuing privacy brouhaha over what its diagnostic software...

Web Security Expert Warns Of Cyber World War
From ACM Opinion

Web Security Expert Warns Of Cyber World War

Eugene Kaspersky is not given to easy hyperbole. But the Russian maths genius who founded an internet security empire with a global reach, clutched at his thick...

From ACM News

Kevin Mitnick Rates Today's Blackhats

Kevin Mitnick was hacking when the LulzSec kids were still in training pants.

Ron Rivest on Fixing Ssl, Apts, and the Future of Security
From ACM Opinion

Ron Rivest on Fixing Ssl, Apts, and the Future of Security

One of the biggest talks at this year's Black Hat Briefings was a presentation on the structural problem with digital certificate authorities by Moxie Marlinspike...

The 'worm' That Could Bring Down the Internet
From ACM Opinion

The 'worm' That Could Bring Down the Internet

For the past three years, a highly encrypted computer worm called Conficker has been spreading rapidly around the world. As many as 12 million computers have...

Security Expert: ­.s. 'leading Force' Behind Stuxnet
From ACM News

Security Expert: ­.s. 'leading Force' Behind Stuxnet

German cybersecurity expert Ralph Langner warns that U.S. utility companies are not yet prepared to deal with the threat presented by the Stuxnet computer worm...

Meet Dark Tangent, the Hacker Behind Black Hat and Def Con
From ACM News

Meet Dark Tangent, the Hacker Behind Black Hat and Def Con

The word "hacker" evokes all kinds of scary images. But Jeff Moss says hackers are exactly what the world needs more of, because they can make the Internet safer...

'i Fear the Net Will Soon Become a War Zone'
From ACM Opinion

'i Fear the Net Will Soon Become a War Zone'

Evgeny Kaspersky is one of Russia's top Internet virus hunters. In an interview, he discusses a raft of recent hacker attacks on multinationals, the "total professionals"...

Living in the Digital Ecosystem
From ACM News

Living in the Digital Ecosystem

LinkedIn founder Reid Hoffman talks data mash-ups, entrepreneurship, and how his site keeps people honest.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account