acm-header
Sign In

Communications of the ACM

Careers


Refine your search:
dateMore Than a Year Ago
subjectSecurity
authorScientific American
Featured Job
bg-corner

What Does a Crooked Election Look Like?
From ACM News

What Does a Crooked Election Look Like?

For voters around the world, including the millions of Americans who will cast ballots in the midterms up to and on November 6, an election is democracy in action—an...

What Worries People about Future Science and Tech Innovations?
From ACM Opinion

What Worries People about Future Science and Tech Innovations?

Many Americans see the future crowding into the present and some of the innovations ahead unnerve them, especially as they reshape ideas about human dominion.

Are We Ready for the Future of Warfare?
From ACM Opinion

Are We Ready for the Future of Warfare?

Warfare has always been about exerting political will.

When Hatred Goes Viral: Inside Social Media's Efforts to Combat Terrorism
From ACM News

When Hatred Goes Viral: Inside Social Media's Efforts to Combat Terrorism

On New Year's Eve in 2015 local and federal agents arrested a 26-year-old man in Rochester, N.Y., for planning to attack people at random later that night using...

How to Hack the Hackers: The Human Side of Cyber Crime
From ACM News

How to Hack the Hackers: The Human Side of Cyber Crime

Say what you will about cybercriminals, says Angela Sasse, "their victims rave about the customer service".

Pentagon Paying Techies to Think Like Terrorists
From ACM Careers

Pentagon Paying Techies to Think Like Terrorists

To stop a terrorist, it helps to think like one.

Gps and the World's First 'space War'
From ACM News

Gps and the World's First 'space War'

Twenty-five years ago U.S.-led Coalition forces launched the world’s first "space war" when they drove Iraqi troops out of Kuwait.

Dating Services Tinker with the Algorithms of Love
From ACM Careers

Dating Services Tinker with the Algorithms of Love

You may have seen the Parks and Recreation episode where Tom Haverford makes 26 different online dating profiles to increase his odds of matching with every woman...

Crime Ring Revelation Reveals Cybersecurity Conflict of Interest
From ACM Careers

Crime Ring Revelation Reveals Cybersecurity Conflict of Interest

A small cybersecurity firm claimed this summer to have uncovered a scam by Russian Internet thieves to amass a mountain of stolen information from 420,000 Web and...

Squiggly Lines Secure Smartphones
From ACM News

Squiggly Lines Secure Smartphones

To protect your financial and personal data, most mobiles come with PIN-based security, biometrics or number grids that require you to retrace a particular pattern...

Bitcoin Vies with New Cryptocurrencies as Coin of the Cyber Realm
From ACM News

Bitcoin Vies with New Cryptocurrencies as Coin of the Cyber Realm

At a bitcoin conference in Miami this January, Jeffrey Tucker, a laissez-faire economist and libertarian icon, made an unexpected observation.

Why We Don't Trust Technology Companies
From ACM Opinion

Why We Don't Trust Technology Companies

Last October, T-Mobile made an astonishing announcement: from now on, when you travel internationally with a T-Mobile phone, you get free unlimited text messages...

How Microsoft's 1 Percenters Balance Basic Research with Short-Term Success
From ACM Opinion

How Microsoft's 1 Percenters Balance Basic Research with Short-Term Success

When Microsoft launched its research labs in 1991, the personal computer was just beginning to blossom into a worldwide phenomenon, thanks in no small part to Windows...

Is High-Tech Security at Public Events Counterproductive?
From ACM Opinion

Is High-Tech Security at Public Events Counterproductive?

Which is more intrusive: security screening and metal detectors every few blocks, or a drone flying high above it taking video of every little thing you do?

Crash Course: Training the Brain of a Driverless Car
From ACM News

Crash Course: Training the Brain of a Driverless Car

Early attempts at driverless cars have had little difficulty gathering the loads of data required to operate autonomously.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account