From Communications of the ACM
Digital innovation is not working in the interest of the whole of society. It is time to radically rethink its purpose without…
Filippo Gualtiero Blancato| March 1, 2024
Has the U.S. government been caught with its virtual hands in the world's cookie jar? And might it lose control of the Internet as a consequence?MSNBC From ACM Opinion | June 12, 2012
Two weeks ago, when we announced the discovery of the Flame malware we said that we saw no strong similarity between its code and programming style with that of ...Kaspersky Lab From ACM News | June 11, 2012
Proteins are the workhorses of our cells: They turn food into energy and determine our health. Each one is a chain of molecules—sometimes thousands of links long—that...Bloomberg Businessweek From ACM Opinion | June 11, 2012
Another day, another senior al-Qaeda leader killed by a drone strike. (I can't be the first to point out that being al-Qaeda's No. 2 is like being the drummer for...Time From ACM Opinion | June 9, 2012
Sir Tim Berners-Lee is the reason you're reading this story in a web browser, complete with hypertext like this and an internet address that looks like this: ...Wired From ACM Opinion | June 8, 2012
In 1945, the United States organized a committee to investigate whether nuclear weapons should become a central military technology, or whether to abjure the weapons...Bulletin of the Atomic Scientists From ACM Opinion | June 8, 2012
Despite the massive amounts of computing power dedicated by search engine companies to crawling and indexing trillions of documents on the Internet, search engines...Arstechnica From ACM Opinion | June 8, 2012
The National Spelling Bee of 2023 started out like any other, but controversy enveloped the contest when Suzy Hamilton, an 8-year-old from Tulsa, emerged as the...The Wall Street Journal From ACM News | June 7, 2012
In the last week or so, cyberwarfare has made front-page news: the United States may have been behind the Stuxnet cyberattack on Iran; Iran may have suffered another...The Atlantic From ACM Opinion | June 6, 2012
In December 2010, after we had reverse engineered the Stuxnet virus, I argued that the attackers must have known they would open Pandora's box. Others suggested...The New York Times From ACM Opinion | June 6, 2012
Sitting in the front row for the first full day of the International Conference on Cyber Conflict was one of the industry’s foremost "rock star" researchers, ...Arstechnica From ACM Opinion | June 6, 2012
Eugene Kaspersky, whose lab discovered the Flame virus that has attacked computers in Iran and elsewhere in the Middle East, said on Wednesday only a global effort...Reuters From ACM Opinion | June 6, 2012
Until recently, the idea of holding a conversation with a computer seemed pure science fiction. If you asked a computer to "open the pod bay doors"—well, that was...Technology Review From ACM Opinion | June 5, 2012
A couple of days ago, I received an e-mail from Iran. It was sent by an analyst from the Iranian Computer Emergency Response Team, and it was informing me about...Wired From ACM Opinion | June 1, 2012
If you ever come across a photograph of communist-era East Berlin, or modern Pyongyang in North Korea, the cityscapes look drab and featureless. Billboards, advertising...New Scientist From ACM Opinion | May 30, 2012
There is one version of Craig Venter's life story where he would’ve been a dutiful scientist at the National Institutes of Health, a respected yet anonymous researcher...Wired From ACM Opinion | May 30, 2012
Two weeks ago, Steve Wozniak made a public call for Apple to open its platforms for those who wish to tinker, tweak and innovate with their internals. EFF supports...Electronic Frontier Foundation From ACM Opinion | May 30, 2012
Should we worry about cyberwarfare? Judging by excessively dramatic headlines in the media, very much so. Cyberwarfare, the argument goes, might make wars easier...Slate From ACM Opinion | May 29, 2012
From all indications, it would appear that attackers are continuing to attack and malware authors are carrying on writing malware.Threatpost From ACM Opinion | May 29, 2012