acm-header
Sign In

Communications of the ACM

Careers


Featured Job
bg-corner

California Legislators Make Cybersecurity Education a Top Priority
From ACM Careers

California Legislators Make Cybersecurity Education a Top Priority

State of California educators, government, and business representatives are working together to meet demands for cybersecurity workers and create opportunities...

Does Facebook Even Know How to Control Facebook?
From ACM Opinion

Does Facebook Even Know How to Control Facebook?

Later today, executives from Facebook, Google, and Twitter will go before the Senate Intelligence Committee to testify about the ways that Russian operatives used...

Facebook Struggles to Contain Russia Narrative
From ACM Careers

Facebook Struggles to Contain Russia Narrative

Facebook has been happy to keep congressional investigators focused on the Russian-bought online ads that helped sway voters in last year's election—despite the...

'combosquatting' Attack Hides in Plain Sight to Trick Computer ­sers
From ACM Careers

'combosquatting' Attack Hides in Plain Sight to Trick Computer ­sers

Attackers are tricking users into visiting website domains that contain familiar trademarks — but with additional words that change the destination to an attack...

Twitter Bans Russian Government-Owned News Sites Rt and Sputnik from Buying Ads
From ACM News

Twitter Bans Russian Government-Owned News Sites Rt and Sputnik from Buying Ads

Twitter is banning two Russian government-affiliated news sites from advertising on its platform, the social network said Thursday.

Like Magic: The Tech That Goes Into Making Money Harder to Fake
From ACM News

Like Magic: The Tech That Goes Into Making Money Harder to Fake

In 2005, shortly after earning a master's degree in electrical and computer engineering, Sam Cape was looking for work online when he came across a cryptic help...

How Kaspersky Lab Got on the US Government's Bad Side
From ACM Careers

How Kaspersky Lab Got on the US Government's Bad Side

The US government and one of the most popular and well-reviewed antivirus software companies are going through a messy breakup.

Researchers Expose Secret Misuse of Personal Data By Mobile Apps
From ACM Careers

Researchers Expose Secret Misuse of Personal Data By Mobile Apps

Computer science researchers at Baldwin Wallace University have developed a novel solution to inform mobile device users about the hidden misuse of their personal...

Online Game Will Spot If You Have Hidden Cybersecurity Talents
From ACM Careers

Online Game Will Spot If You Have Hidden Cybersecurity Talents

Studying music? Good news, you may have the skills to work in cybersecurity. An online training platform launching next week in the UK—with the backing of Robert...

For $1,000, Anyone Can Purchase Online Ads to Track Your Location and App Use
From ACM Careers

For $1,000, Anyone Can Purchase Online Ads to Track Your Location and App Use

For roughly $1,000, someone with devious intent can purchase and target online advertising in ways that allow them to track the location of other individuals and...

China's Xi Calls For More Technology Development
From ACM Careers

China's Xi Calls For More Technology Development

President Xi Jinping called Wednesday for the ruling Communist Party to lead development of Chinese technology industries, an area fraught with trade tensions and...

Welcoming Our New Robot Overlords
From ACM Careers

Welcoming Our New Robot Overlords

When David Stinson finished high school, in Grand Rapids, Michigan, in 1977, the first thing he did was get a job building houses.

Would You Buy a Self-Driving Future From These Guys?
From ACM Opinion

Would You Buy a Self-Driving Future From These Guys?

When the owner of an automated Tesla was killed in a crash last year, the carmaker's founder, Elon Musk, urged journalists to peer into the future.

Bug Bounty Hunters Can Make Big Bucks with the Right Hack
From ACM Careers

Bug Bounty Hunters Can Make Big Bucks with the Right Hack

Back in 2002, Tommy DeVoss had some unwanted guests at his front door: FBI agents, ready to raid his home.

How Bitcoins Are Mined in Moscow Kitchens
From ACM Careers

How Bitcoins Are Mined in Moscow Kitchens

Dmitry Gutov's Moscow kitchen is home to an automated mining operation. Not for gold and industrial metals like many of his country's exporters, but for bitcoin...

­csd's Stefan Savage Wins a Macarthur Award
From ACM Careers

­csd's Stefan Savage Wins a Macarthur Award

Stefan Savage, who's just won a five-year, $625,000 "genius" grant from the MacArthur Foundation, talks about how he became interested in cybersecurity, computer...

The Female Code-Breakers Who Were Left Out of History Books
From ACM Careers

The Female Code-Breakers Who Were Left Out of History Books

Picture this. In 1917, the United States is just entering World War One. But to begin with, its military is small and its capacity for intelligence gathering is...

Google, Facebook and Twitter scramble to Hold Washington at Bay
From ACM Careers

Google, Facebook and Twitter scramble to Hold Washington at Bay

Google summoned about 200 policy staff from around the world last month for a debate on whether the company's size has made it too attractive as a target for government...

The Nsa Officially Has a Rogue Contractor Problem
From ACM Careers

The Nsa Officially Has a Rogue Contractor Problem

The NSA is one of the world's most notoriously secretive and powerful government agencies, guarding its powerful hacking tools and massive caches of collected data...

Texas Tech Researcher explores Cardiac Waveforms For Cyber Authentication
From ACM Careers

Texas Tech Researcher explores Cardiac Waveforms For Cyber Authentication

Changzhi Li is looking to develop a method of continuous authentication that utilizes the waveform of the human heartbeat to ensure the security of sensitive information...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account