acm-header
Sign In

Communications of the ACM

Careers


Featured Job
bg-corner

You Wouldn't Think It, But Typeface Piracy Is a Big Problem
From ACM News

You Wouldn't Think It, But Typeface Piracy Is a Big Problem

It's safe to assume that most people have no idea that fonts, like music or movies, are protected by intellectual property laws, they usually come with a hefty...

Tech Companies Can Blame Snowden For Data Privacy Decision
From ACM Opinion

Tech Companies Can Blame Snowden For Data Privacy Decision

A ruling the Europe Union’s highest court yesterday may create enormous headaches for US tech companies like Google and Facebook.

When Security Experts Gather to Talk Consensus, Chaos Ensues
From ACM Careers

When Security Experts Gather to Talk Consensus, Chaos Ensues

Security researchers and vendors have long been locked in a debate over how to disclose security vulnerabilities, and there's little on which the two sides agree...

New Crypto Tool Makes Anonymous Surveys Truly Anonymous
From ACM Careers

New Crypto Tool Makes Anonymous Surveys Truly Anonymous

At the end of a semester teaching an undergraduate math course a few years ago, Cornell Tech researcher and crypto professor Rafael Pass asked his students to fill...

How Fiction Can Reveal the Horrors of Future Wars
From ACM Opinion

How Fiction Can Reveal the Horrors of Future Wars

The fact that he couldn't feel the drill going into the back of his skull made the noise all the more terrifying.

Hackers Can Disable a Sniper Rifle—Or Change Its Target
From ACM News

Hackers Can Disable a Sniper Rifle—Or Change Its Target

Put a computer on a sniper rifle, and it can turn the most amateur shooter into a world-class marksman.

The Tools Inspectors Can Use to Catch Iran's Nuclear Hijinks
From ACM News

The Tools Inspectors Can Use to Catch Iran's Nuclear Hijinks

After Tuesday's historic agreement between Iran and the "P5+1" group of countries, inspectors from the International Atomic Energy Agency will have access to all...

Mit’s Bitcoin-Inspired 'enigma' Lets Computers Mine Encrypted Data
From ACM Careers

Mit’s Bitcoin-Inspired 'enigma' Lets Computers Mine Encrypted Data

The cryptography behind bitcoin solved a paradoxical problem: a currency with no regulator, that nonetheless can't be counterfeited.

Apple's Latest Selling Point: How Little It Knows About You
From ACM Careers

Apple's Latest Selling Point: How Little It Knows About You

Apple wants its devices to know everything about you. But more than ever, it wants you to know that Apple doesn't know what those devices know.

This Little 3D Printed Robot Cracks Combination Locks in 30 Seconds
From ACM News

This Little 3D Printed Robot Cracks Combination Locks in 30 Seconds

Careful what you leave in your lockers, high school students and gym-goers.

DARPA Is Developing a Search Engine For the Dark Web
From ACM News

DARPA Is Developing a Search Engine For the Dark Web

A new search engine being developed by Darpa aims to shine a light on the dark web and uncover patterns and relationships in online data to help law enforcement...

The '90s Startup That Terrified Microsoft and Got Americans to Go Online
From ACM Careers

The '90s Startup That Terrified Microsoft and Got Americans to Go Online

Nineteen ninety-five was the inaugural year of the 21st century, a clear starting point for contemporary life.

Microsoft in the Age of Satya Nadella
From ACM Careers

Microsoft in the Age of Satya Nadella

On a campus notable for tight security and secret offices, Building 92 is a rare beacon of openness. Guests can enter without a Microsoft ID and browse corporate...

Facebook, Google, and the Rise of Open Source Security Software
From ACM Careers

Facebook, Google, and the Rise of Open Source Security Software

Facebook chief security officer Joe Sullivan says that people like Mike Arpaia are hard to find.

Hackers Gather For Cyberwar in an Intense 48-Hour Sim
From ACM Careers

Hackers Gather For Cyberwar in an Intense 48-Hour Sim

Locked Shields is among the world's preeminent cyber attack simulations.

Meet the Puzzle Mastermind Who Designs Def Con's Hackable Badges
From ACM Careers

Meet the Puzzle Mastermind Who Designs Def Con's Hackable Badges

Def Con is one of the world's biggest hacker conventions, an annual gathering of security experts, cryptographers and at least a few people who could surreptitiously...

Tech Giants Begin Recruiting For the Next Big Platform Wars
From ACM Careers

Tech Giants Begin Recruiting For the Next Big Platform Wars

The Internet of Things is still young, but it's real.

The Moral Hazards and Legal Conundrums of Our Robot-Filled Future
From ACM Opinion

The Moral Hazards and Legal Conundrums of Our Robot-Filled Future

The robots are coming, and they're getting smarter.

How Google Map Hackers Can Destroy a Business at Will
From ACM Careers

How Google Map Hackers Can Destroy a Business at Will

Washington DC-area residents with a hankering for lion meat lost a valuable source of the (yes, legal) delicacy last year when a restaurant called the Serbian Crown...

Researchers Find and Decode the Spy Tools Governments ­se to Hijack Phones
From ACM News

Researchers Find and Decode the Spy Tools Governments ­se to Hijack Phones

Newly uncovered components of a digital surveillance tool used by more than 60 governments worldwide provide a rare glimpse at the extensive ways law enforcement...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account