acm-header
Sign In

Communications of the ACM

Careers


Featured Job
bg-corner

How the Nsa Identified Satoshi nakamoto
From ACM Careers

How the Nsa Identified Satoshi nakamoto

The 'creator' of Bitcoin, Satoshi Nakamoto, gave NSA investigators the only tool they needed to find him — his own words. 

With the Uss mccain Collision, Even Navy Tech Can't Overcome Human Shortcomings
From ACM News

With the Uss mccain Collision, Even Navy Tech Can't Overcome Human Shortcomings

In the darkness of early morning on August 21, the guided-missile destroyer USS John S. McCain collided with a tanker in the Strait of Malacca off Singapore.

Wanted: Weaponized Exploits that Hack Phones. Will Pay Top Dollar
From ACM Careers

Wanted: Weaponized Exploits that Hack Phones. Will Pay Top Dollar

In a sign of the soaring demand for zeroday attacks that target software that's becoming increasingly secure, a market-leading broker is offering serious cash for...

The Tech Industry Is Hiring Israeli Engineers as Fast as the Army Can Produce Them
From ACM Careers

The Tech Industry Is Hiring Israeli Engineers as Fast as the Army Can Produce Them

United Airlines started a three-flights-per-week service from San Francisco to Tel Aviv last year.

End of the Checkout Line: The Looming Crisis For American Cashiers
From ACM Careers

End of the Checkout Line: The Looming Crisis For American Cashiers

The day before a fully automated grocery store opened its doors in 1939, the inventor Clarence Saunders took out a full page advertisement in the Memphis Press-Scimitar...

What the Announced nsa / Cyber Command Split means
From ACM Opinion

What the Announced nsa / Cyber Command Split means

The move to elevate Cyber Command to a full Unified Combatant Command and split it off from the National Security Agency or NSA shows that cyber intelligence collection...

Defeating Cyberattacks on 3-D Printers
From ACM Careers

Defeating Cyberattacks on 3-D Printers

Rutgers University and Georgia Tech engineers have devised three ways to combat cyberattacks on 3-D printers.

China's Plan For World Domination in AI Isn't So Crazy After All
From ACM Careers

China's Plan For World Domination in AI Isn't So Crazy After All

Xu Li's software scans more faces than maybe any on earth. He has the Chinese police to thank.

Meet the Company That's ­sing Face Recognition to Reshape China's Tech Scene
From ACM Careers

Meet the Company That's ­sing Face Recognition to Reshape China's Tech Scene

In China, face recognition is transforming many aspects of daily life.

The Ghostly Radio Station That No One Claims to Run
From ACM Careers

The Ghostly Radio Station That No One Claims to Run

In the middle of a Russian swampland, not far from the city of St Petersburg, is a rectangular iron gate.

Apple Defends Complying with China Over Vpns
From ACM Careers

Apple Defends Complying with China Over Vpns

Virtual Private Networks are often used to skirt censorship and surveillance in countries with tight restrictions on internet use.

As Washington Tries to Protect Tech, China Could Fight Back
From ACM Careers

As Washington Tries to Protect Tech, China Could Fight Back

As the Trump administration moves to take on China over intellectual property, Washington will find it has limited firepower.

New Web Tool Tracks Russian 'influence Ops' on Twitter
From ACM News

New Web Tool Tracks Russian 'influence Ops' on Twitter

The Alliance for Securing Democracy, a bipartisan project backed by the German Marshall Fund of the United States (GMF), has launched a Web tool to keep tabs on...

­kraine Finally Battens Down Its Leaky Cyber Hatches After Attacks
From ACM News

­kraine Finally Battens Down Its Leaky Cyber Hatches After Attacks

When the chief of Microsoft Ukraine switched jobs to work for President Petro Poroshenko, he found that everyone in the office used the same login password.

­.s. Senators to Introduce Bill to Secure 'internet of Things'
From ACM Careers

­.s. Senators to Introduce Bill to Secure 'internet of Things'

A bipartisan group of U.S. senators on Tuesday plans to introduce legislation seeking to address vulnerabilities in computing devices embedded in everyday objects—known...

To Fix Voting Machines, Hackers Tear Them Apart
From ACM News

To Fix Voting Machines, Hackers Tear Them Apart

The toughest thing to convey to newcomers at the DefCon Voting Village in Las Vegas this weekend? Just how far they could go with hacking voting machines set up...

The ­.s. Army Is Teaching Kids How to Hack at Def Con
From ACM Careers

The ­.s. Army Is Teaching Kids How to Hack at Def Con

The U.S. Army is teaching children "white hat," or ethical, hacking skills.

Flush Times For Hackers in Booming Cyber Security Job Market
From ACM Careers

Flush Times For Hackers in Booming Cyber Security Job Market

The surge in far-flung and destructive cyber attacks is not good for national security, but for an increasing number of hackers and researchers, it is great for...

The College Course Where the Military Assigns the Homework
From ACM Careers

The College Course Where the Military Assigns the Homework

This spring, as part of their coursework, four Stanford University students found themselves in Coronado, California, doing pushups on the beach and charging into...

What Happened to Trump's War on Data?
From ACM Opinion

What Happened to Trump's War on Data?

On May 16, three months' worth of data vanished quietly from the website of the U.S. Census Bureau.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account