acm-header
Sign In

Communications of the ACM

Careers


Featured Job
bg-corner

Your Smartphone's Next Trick? Fighting Cybercrime
From ACM Careers

Your Smartphone's Next Trick? Fighting Cybercrime

A University at Buffalo-led team of researchers has discovered how to identify smartphones by examining just one photo taken by the device. The advancement opens...

It's Super Hard to Find Humans in the Fcc's Net Neutrality Comments
From ACM News

It's Super Hard to Find Humans in the Fcc's Net Neutrality Comments

The Federal Communications Commissions''public comment period on its plans to repeal net neutrality protections was bombarded with bots, memes, and input from people...

China's Top Ideologue Calls For Tight Control of Internet
From ACM Careers

China's Top Ideologue Calls For Tight Control of Internet

Little heard from but hugely influential, the professor-turned-Communist theoretician who has been a major adviser to three Chinese leaders finally stepped out...

A Tiny New Chip Could Secure the Next Generation of Iot
From ACM Careers

A Tiny New Chip Could Secure the Next Generation of Iot

The Internet of Things security crisis persists, as billions of inadequately secured webcams, refrigerators, and more flood homes around the world.

Army Looks to Tap Civilian Talent For Cyber force
From ACM Careers

Army Looks to Tap Civilian Talent For Cyber force

The U.S. Army Cyber Command has launched a pilot program to recruit tech workers with academic and applied technical experience into its Cyber Direct Commissioning...

Future Wars May Depend as Much on Algorithms as on Ammunition, Report Says. 
From ACM News

Future Wars May Depend as Much on Algorithms as on Ammunition, Report Says. 

The Pentagon is increasingly focused on the notion that the might of U.S. forces will be measured as much by the advancement of their algorithms as by the ammunition...

Australian Man ­ses Snack Bags as Faraday Cage to Block Tracking By Employer
From ACM Careers

Australian Man ­ses Snack Bags as Faraday Cage to Block Tracking By Employer

A 60-year-old electrician in Perth, Western Australia had his termination upheld by a labor grievance commission when it was determined he had been abusing his...

At Berkeley, a New Generation of 'ethical Hackers' Learns to Wage Cyberwar
From ACM Careers

At Berkeley, a New Generation of 'ethical Hackers' Learns to Wage Cyberwar

"Whenever I teach a security class, it happens that there is something going on in the news cycle that ties into it," Doug Tygar, a computer-science professor at...

Google Is Getting Pulled Into a Fight with Russia Over Rt and Sputnik
From ACM Careers

Google Is Getting Pulled Into a Fight with Russia Over Rt and Sputnik

The Russian telecom regulator said Tuesday that it will retaliate against Google if the search giant lowers the search ranking of the Kremlin-backed news outlets...

Borders in the Cloud
From ACM Opinion

Borders in the Cloud

Amazon may well be one of the companies with the strongest data security in the world.

More Than 480 Web Firms Record 'every Keystroke'
From ACM Careers

More Than 480 Web Firms Record 'every Keystroke'

The technique—known as session replay—is used by companies to gain an understanding of how customers use websites.

Giant Telescope's Mobile-Phone 'dead Zones' Rile South African Residents
From ACM Careers

Giant Telescope's Mobile-Phone 'dead Zones' Rile South African Residents

A map showing how mobile-phone use might be restricted because of a giant radio telescope in South Africa has angered people who will live near the instrument—deepening...

Q&a: The Ethics of ­sing Brain Implants to ­pgrade Yourself
From ACM Opinion

Q&a: The Ethics of ­sing Brain Implants to ­pgrade Yourself

Neurotechnology is one of the hottest areas of engineering, and the technological achievements sound miraculous: Paralyzed people have controlled robotic limbs and ...

Survey of Bug Bounty Hunters Shows Who Pans For Pwns
From ACM Careers

Survey of Bug Bounty Hunters Shows Who Pans For Pwns

Asking the crowd for help in fixing security problems is going mainstream.

Meet the Winners of the Biggest Ever Face-Recognition Challenge
From ACM Careers

Meet the Winners of the Biggest Ever Face-Recognition Challenge

The results are in from the biggest computer face-recognition contest to date.

China's Technology Ambitions Could ­pset the Global Trade Order
From ACM News

China's Technology Ambitions Could ­pset the Global Trade Order

When President Trump arrives in Beijing on Wednesday, he will most likely complain about traditional areas of dispute like steel and cars.

Big Brother Isn't Just Watching: Workplace Surveillance Can Track Your Every Move
From ACM Careers

Big Brother Isn't Just Watching: Workplace Surveillance Can Track Your Every Move

How can an employer make sure its remote workers aren't slacking off? In the case of talent management company Crossover, the answer is to take photos of them every...

So You Want to Be a Cybersecurity Expert
From ACM Careers

So You Want to Be a Cybersecurity Expert

California State University offers a variety of degrees and certificate programs at its campuses to prepare students for the rapidly growing cybersecurity field...

Members of Congress Want You to Hack the ­S Election Voting System
From ACM Careers

Members of Congress Want You to Hack the ­S Election Voting System

This summer, DefCon's "Voting Machine Hacking Village" turned up a host of US election vulnerabilities (PDF). Now, imagine a more mainstream national hacking event...

Real Security Requires Strong Encryption–even If Investigators Get Blocked
From ACM Opinion

Real Security Requires Strong Encryption–even If Investigators Get Blocked

The FBI and the U.S. Department of Justice have been fighting against easy, widespread public access to encryption technologies for 25 years.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account