From ACM Careers
Canonical's Open Documentation Academy aims to help newcomers participate in the open source community, offering mentorship and…
BNN| February 28, 2024
Attackers are tricking users into visiting website domains that contain familiar trademarks — but with additional words that change the destination to an attack...Georgia Institute of Technology From ACM Careers | October 30, 2017
By analyzing network traffic going to suspicious domains, security administrators could detect malware infections weeks or even months before they're able to capture...Georgia Institute of Technology From ACM Careers | May 23, 2017
Researchers at Georgia Institute of Technology have developed a form of ransomware that was able to take control of a simulated water treatment plant. The simulated...Georgia Institute of Technology From ACM Careers | February 14, 2017
Nearly $2 million from the U.S. Department of the Navy Office of Naval Research and the Assistant Secretary of Defense for Research and Engineering will fund...Georgia Institute of Technology From ACM Careers | June 25, 2015
A research team at the Georgia Tech Research Institute is studying a range of security challenges involving field programmable gate arrays.Georgia Institute of Technology From ACM Careers | April 28, 2015
In its latest Emerging Cyber Threats Report, Georgia Tech warns about loss of privacy; abuse of trust between users and machines; attacks against the mobile ecosystem...Georgia Institute of Technology From ACM Careers | October 30, 2014
Researchers from Georgia Tech have developed a security system that continuously monitors how a user taps and swipes a mobile device, and locks the device if the...Georgia Institute of Technology From ACM Careers | April 8, 2014
Researchers at Georgia Tech have created a prototype software that takes steps to prevent malware from sending spam emails, instant messages, or money transfers...Georgia Institute of Technology From ACM Careers | February 26, 2014
Few of the growing number of businesses that find their way into the cloud engage in security measures beyond those provided by the associated cloud storage firm...Georgia Institute of Technology From ACM Careers | November 7, 2013
Researchers from the Georgia Tech have discovered two security weaknesses that permit installation of malware onto Apple mobile devices using seemingly innocuous...Georgia Institute of Technology From ACM Careers | July 31, 2013
Researchers at the Georgia Tech Research Institute are working to counter threats from spear phishing. The attacks use knowledge of computer users to gain their...Georgia Institute of Technology From ACM Careers | January 9, 2013
How unsafe are mobile browsers? Unsafe enough that even cyber-security experts are unable to detect when their smartphone browsers have landed on potentially dangerous...Georgia Institute of Technology From ACM Careers | December 7, 2012
The year ahead will feature new and increasingly sophisticated means to capture and exploit user data, escalating battles over the control of online information...Georgia Institute of Technology From ACM Careers | November 14, 2012
As malware threats expand and increasingly focus on industrial espionage, Georgia Tech researchers are launching a malware intelligence system that will help security...Georgia Institute of Technology From ACM Careers | May 24, 2012
A research team from Georgia Tech has discovered how to program a smartphone to sense nearby keyboard vibrations and decipher complete sentences with up to 80 percent...Georgia Institute of Technology From ACM Careers | October 19, 2011
Sign In for Full Access
Select openings viewable to ACM Professional and Student Members.