acm-header
Sign In

Communications of the ACM

Careers


Featured Job
bg-corner

Mail from the (velvet) Cybercrime ­nderground
From ACM Opinion

Mail from the (velvet) Cybercrime ­nderground

Over the past six months, "fans" of this Web site and its author have shown their affection in some curious ways.

Government Can Grab Cell Phone Location Records Without Warrant, Appeals Court Says
From ACM News

Government Can Grab Cell Phone Location Records Without Warrant, Appeals Court Says

In a major victory for the Justice Department over privacy advocates, a federal appeals court ruled Tuesday that government agencies can collect records showing...

Georgia Tech Uncovers Ios Security Weaknesses
From ACM Careers

Georgia Tech Uncovers Ios Security Weaknesses

Researchers from the Georgia Tech have discovered two security weaknesses that permit installation of malware onto Apple mobile devices using seemingly innocuous...

Zeroing In on ­nbreakable Computer Security
From ACM News

Zeroing In on ­nbreakable Computer Security

The news out of Moscow of late has been dominated by Edward Snowden, the American leaker of secret state documents who is currently seeking temporary asylum in...

Your Body Is the Computer
From ACM News

Your Body Is the Computer

The last few years have presented an unprecedented shift in the computing world as PCs are being replaced with mobile devices. But now that a large portion of the...

Software Experts Attack Cars, to Release Code As Hackers Meet
From ACM News

Software Experts Attack Cars, to Release Code As Hackers Meet

Car hacking is not a new field, but its secrets have long been closely guarded.

Nsa Growth Fueled By Need to Target Terrorists
From ACM News

Nsa Growth Fueled By Need to Target Terrorists

Twelve years later, the cranes and earthmovers around the National Security Agency are still at work, tearing up pavement and uprooting trees to make room for a...

Hey Kids! Learn to Be "cyber Smart” from the Nsa's Youth Page!
From ACM Careers

Hey Kids! Learn to Be "cyber Smart” from the Nsa's Youth Page!

The National Security Agency wants your kids to know that it's cool to be "cyber smart."

Your Creative, Open Hackathon Is Ripe For Legal Challenges
From ACM Opinion

Your Creative, Open Hackathon Is Ripe For Legal Challenges

NASA's Space Apps Challenge recently became the world's largest open hackathon, with over 8,000 participants spanning 44 countries.

Nsa Revelations Reframe Digital Life For Some
From ACM News

Nsa Revelations Reframe Digital Life For Some

In Louisiana, the wife of a former soldier is scaling back on Facebook posts and considering unfriending old acquaintances, worried an innocuous joke or long-lost...

Rensselaer To Train U.S. Navy Officers in IT and Web Sciences
From ACM Careers

Rensselaer To Train U.S. Navy Officers in IT and Web Sciences

The U.S. Navy is turning to the Information Technology and Web Science Program at Rensselaer Polytechnic Institute to prepare a select group of U.S. Navy officers...

Eye-Tracking Could Outshine Passwords If Made ­ser-Friendly
From ACM Careers

Eye-Tracking Could Outshine Passwords If Made ­ser-Friendly

University of Washington engineers found in a recent study that the user's experience could be key to creating an authentication system that doesn't rely on passwords...

Attention, Shoppers: Store Is Tracking Your Cell
From ACM News

Attention, Shoppers: Store Is Tracking Your Cell

Like dozens of other brick-and-mortar retailers,Nordstrom wanted to learn more about its customers—how many came through the doors, how many were repeat visitors—the...

From ACM Careers

Israel's Military-Entrepreneurial Complex Owns Big Data

Two years ago, a half-dozen programmers and entrepreneurs started working together in a Tel Aviv basement to create one of Israel's 5,000 high-tech companies.

Researchers Find Bug Bounty Programs Pay Economic Rewards
From ACM News

Researchers Find Bug Bounty Programs Pay Economic Rewards

Bug bounty programs can be as much as 100 times more cost-effective for finding security vulnerabilities than hiring full-time security researchers to do the same...

What Your Metadata Says About You
From ACM Opinion

What Your Metadata Says About You

As recently as a few weeks ago, "metadata" was an obscure term known mainly to techies and academics.

Protecting Data in the Cloud
From ACM Careers

Protecting Data in the Cloud

A new hardware component design makes data encryption more secure by disguising cloud servers' memory-access patterns.  

Siri's Creators Demonstrate an Assistant That Takes the Initiative
From ACM News

Siri's Creators Demonstrate an Assistant That Takes the Initiative

In a small, dark, room off a long hallway within a sprawling complex of buildings in Silicon Valley, an array of massive flat-panel displays and video cameras track ...

The Watchers
From ACM News

The Watchers

Looking down from 500 miles above Earth's surface, you could watch the FedEx Custom Critical Delivery truck move across the country along 3,140 miles of highway...

Nist Seeks Private-Sector Input at Cybersecurity Framework Workshop
From ACM Careers

Nist Seeks Private-Sector Input at Cybersecurity Framework Workshop

The National Institute of Standards and Technology has opened registration for its 3rd Cybersecurity Framework Workshop, to be held July 10-12, 2013, in San Diego...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account