acm-header
Sign In

Communications of the ACM

Careers


Featured Job
bg-corner

'combosquatting' Attack Hides in Plain Sight to Trick Computer ­sers
From ACM Careers

'combosquatting' Attack Hides in Plain Sight to Trick Computer ­sers

Attackers are tricking users into visiting website domains that contain familiar trademarks — but with additional words that change the destination to an attack...

Network Traffic Provides Early Indication of Malware Infection
From ACM Careers

Network Traffic Provides Early Indication of Malware Infection

By analyzing network traffic going to suspicious domains, security administrators could detect malware infections weeks or even months before they're able to capture...

Simulated Ransomware Attack Shows Vulnerability of Industrial Controls
From ACM Careers

Simulated Ransomware Attack Shows Vulnerability of Industrial Controls

Researchers at Georgia Institute of Technology have developed a form of ransomware that was able to take control of a simulated water treatment plant. The simulated...

Naval Research Funding to Bolster Cyber Defense
From ACM Careers

Naval Research Funding to Bolster Cyber Defense

Nearly $2 million from the U.S. Department of the Navy Office of Naval Research and the Assistant Secretary of Defense for Research and Engineering will fund...

Advancing Security and Trust in Reconfigurable Devices
From ACM Careers

Advancing Security and Trust in Reconfigurable Devices

A research team at the Georgia Tech Research Institute is studying a range of security challenges involving field programmable gate arrays.

Georgia Tech Releases 2015 Emerging Cyber Threats Report
From ACM Careers

Georgia Tech Releases 2015 Emerging Cyber Threats Report

In its latest Emerging Cyber Threats Report, Georgia Tech warns about loss of privacy; abuse of trust between users and machines; attacks against the mobile ecosystem...

Personal Touch Signature Makes Mobile Devices More Secure
From ACM Careers

Personal Touch Signature Makes Mobile Devices More Secure

Researchers from Georgia Tech have developed a security system that continuously monitors how a user taps and swipes a mobile device, and locks the device if the...

'what You See Is What You Send'
From ACM Careers

'what You See Is What You Send'

Researchers at Georgia Tech have created a prototype software that takes steps to prevent malware from sending spam emails, instant messages, or money transfers...

Cyber Report Warns of Threats to Cloud Data Storage, Mobile Devices
From ACM Careers

Cyber Report Warns of Threats to Cloud Data Storage, Mobile Devices

Few of the growing number of businesses that find their way into the cloud engage in security measures beyond those provided by the associated cloud storage firm...

Georgia Tech Uncovers Ios Security Weaknesses
From ACM Careers

Georgia Tech Uncovers Ios Security Weaknesses

Researchers from the Georgia Tech have discovered two security weaknesses that permit installation of malware onto Apple mobile devices using seemingly innocuous...

Researchers Work to Counter Spear Phishing Attacks
From ACM Careers

Researchers Work to Counter Spear Phishing Attacks

Researchers at the Georgia Tech Research Institute are working to counter threats from spear phishing. The attacks use knowledge of computer users to gain their...

Mobile Browsers Fail Safety Test
From ACM Careers

Mobile Browsers Fail Safety Test

How unsafe are mobile browsers? Unsafe enough that even cyber-security experts are unable to detect when their smartphone browsers have landed on potentially dangerous...

Georgia Tech Releases Cyber Threats Forecast for 2013
From ACM Careers

Georgia Tech Releases Cyber Threats Forecast for 2013

The year ahead will feature new and increasingly sophisticated means to capture and exploit user data, escalating battles over the control of online information...

Safety in Numbers: Threat Intelligence System Pools Malware Data
From ACM Careers

Safety in Numbers: Threat Intelligence System Pools Malware Data

As malware threats expand and increasingly focus on industrial espionage, Georgia Tech researchers are launching a malware intelligence system that will help security...

Georgia Tech Turns Iphone Into Spiphone
From ACM Careers

Georgia Tech Turns Iphone Into Spiphone

A research team from Georgia Tech has discovered how to program a smartphone to sense nearby keyboard vibrations and decipher complete sentences with up to 80 percent...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account