acm-header
Sign In

Communications of the ACM

Recent Articles


Articles Interviews Vardi's Insights Chien's Vantage Opinion Archive Refine your search:
dateMore Than a Year Ago
subjectSecurity
authorScientific American
bg-corner

How the Icloud Hack Happened and How to Avoid Being Next
From ACM Opinion

How the Icloud Hack Happened and How to Avoid Being Next

Mat Honan, the technology reporter who was digitally disemboweled this past weekend, has revealed exactly how he was so spectacularly owned. His case, a cascade...

From ACM Opinion

How Can Malware Be Stopped?

The world of cybersecurity is starting to resemble a paranoid thriller.

Electronic Health Records Face Human Hurdles More Than Technological Ones
From ACM News

Electronic Health Records Face Human Hurdles More Than Technological Ones

In medicine, there's the patient and there's the chart. And the chart is paper.

Does the ­.s. Census Need a 21st-Century Makeover?
From ACM Opinion

Does the ­.s. Census Need a 21st-Century Makeover?

The Internet Age is upon us. But rather than circulating online, the 23rd Decennial Census stuck with the tried-and-true, and flooded the U.S. Postal Service March...

From ACM Opinion

Connecting with an Internet Pioneer, 40 Years Later

Forty years ago—on December 5, 1969—the U.S. Department of Defense's Advanced Research Projects Agency (ARPA) connected four computer network nodes at the University...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account