acm-header
Sign In

Communications of the ACM

Careers


Featured Job
bg-corner

­.s. National Security Prosecutors Shift Focus from Spies to Cyber
From ACM News

­.s. National Security Prosecutors Shift Focus from Spies to Cyber

The U.S. Justice Department is restructuring its national security prosecution team to deal with cyber attacks and the threat of sensitive technology ending up...

IBM Struggles to Reinvent Itself in an Age of Cloud
From ACM Careers

IBM Struggles to Reinvent Itself in an Age of Cloud

When IBM Corp CEO Ginni Rometty was asked recently for her tips on how to transform companies, she spoke of "relentless reinvention" and not protecting the past...

New Smartphone App Gives Sight to the Blind
From ACM Careers

New Smartphone App Gives Sight to the Blind

Jonathan Mosen, who has been blind since birth, spent his evening snapping photos of packages in the mail, his son's school report and labels on bottles in the...

Nato Agrees Cyber Attack Could Trigger Military Response
From ACM News

Nato Agrees Cyber Attack Could Trigger Military Response

NATO leaders agreed on Friday that a large-scale cyber attack on a member country could be considered an attack on the entire U.S.-led alliance, potentially triggering...

China Targets Own Operating System to Take on Likes of Microsoft, Google
From ACM News

China Targets Own Operating System to Take on Likes of Microsoft, Google

China could have a new homegrown operating system by October to take on imported rivals such as Microsoft Corp, Google Inc and Apple Inc, Xinhua news agency said...

Hacker Says to Show Passenger Jets at Risk of Cyber Attack
From ACM News

Hacker Says to Show Passenger Jets at Risk of Cyber Attack

Cyber security researcher Ruben Santamarta says he has figured out how to hack the satellite communications equipment on passenger jets through their WiFi and inflight...

Talk on Cracking Internet Anonymity Service Tor Canceled
From ACM News

Talk on Cracking Internet Anonymity Service Tor Canceled

A highly anticipated talk on how to identify users of the Internet privacy service Tor was withdrawn from the upcoming Black Hat security conference, a spokeswoman...

Digital Warriors Battle to Get African Games on Phones
From ACM Careers

Digital Warriors Battle to Get African Games on Phones

Safari the warrior crouches in the bush - a digitized heroine from the new mobile phone game "Afro Fighters" that its Nigerian creator hopes will soon rival the...

Mastercard Expects Big Growth from 'big Data' Insights
From ACM Careers

Mastercard Expects Big Growth from 'big Data' Insights

MasterCard Inc, the world's second-largest debit and credit card company, sees business booming from selling data to retailers, banks, and governments on spending...

­.s. Companies Seek Cyber Experts For Top Jobs, Board Seats
From ACM Careers

­.s. Companies Seek Cyber Experts For Top Jobs, Board Seats

Some of the largest U.S. companies are looking to hire cybersecurity experts in newly elevated positions and bring technologists on to their boards, a sign that...

The Most Expensive Lottery Ticket in the World
From ACM Opinion

The Most Expensive Lottery Ticket in the World

No Exit, the new book from Gideon Lewis-Kraus, should be required reading for anybody who thinks it might be a good idea to found a startup in Silicon Valley.

Mobile Privacy Sells in Post-Snowden World
From ACM Careers

Mobile Privacy Sells in Post-Snowden World

Following the Snowden snooping revelations, there is growing interest in a range of mobile phone products with one central selling point: privacy.

Israeli Startups Dream of a Bitcoin World
From ACM Careers

Israeli Startups Dream of a Bitcoin World

"Welcome to the new economy," boasts a sign at the entrance of the self-styled Bitcoin Embassy in the heart of Tel Aviv.

China Bars Banks from Bitcoin Transactions
From ACM News

China Bars Banks from Bitcoin Transactions

China's government banned financial institutions from trading in bitcoin on Thursday, in what analysts said was a restrained first step towards regulating the digital...

Microsoft's New Cybercrime Center Combines Tactics Against Hacking Groups
From ACM Careers

Microsoft's New Cybercrime Center Combines Tactics Against Hacking Groups

The maker of the most popular computer operating system in the world is launching a new strategy against criminal hackers by bringing together security engineers...

Should We Believe More in Big Data or in Magic?
From ACM Opinion

Should We Believe More in Big Data or in Magic?

One year I spent a lot of time with professional magicians.

Haunted House Business Gets Boost As Techs ­p Thrill Ante
From ACM News

Haunted House Business Gets Boost As Techs ­p Thrill Ante

Ed Terebus was an 18-year-old high school student when he and his big brother Jim, a laid-off auto worker, decided to build their first haunted house 34 years ago...

Wall Street Banks Learn How to Survive in Staged Cyber Attack
From ACM News

Wall Street Banks Learn How to Survive in Staged Cyber Attack

In a staged simulation called Quantum Dawn 2, bank executives in charge of operations, technology, and crisis planning were tasked with detecting how a massive...

Cyber Warrior Shortage Hits Anti-Hacker Fightback
From ACM Careers

Cyber Warrior Shortage Hits Anti-Hacker Fightback

For the governments and corporations facing increasing computer attacks, the biggest challenge is finding the right cyber warriors to fight back.

Facebook and Twitter Too Late For China's Internet
From ACM Careers

Facebook and Twitter Too Late For China's Internet

Facebook Inc and Twitter face a daunting task in China, if access to their social networks is unblocked, as they would be up against deeply entrenched domestic...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account