acm-header
Sign In

Communications of the ACM

Careers


Featured Job
bg-corner

The Real Reason America Controls Its Nukes with Ancient Floppy Disks
From ACM Opinion

The Real Reason America Controls Its Nukes with Ancient Floppy Disks

America's nuclear arsenal depends on a surprising relic of the 1970s that few of us may recall: the humble floppy disk.

Detroit's Grand Plan to Lead the Self-Driving Revolution
From ACM Careers

Detroit's Grand Plan to Lead the Self-Driving Revolution

The cradle of American automotive innovation has in the past decade migrated 2,000 miles from Detroit to Silicon Valley, where autonomous vehicles and other advanced...

Artificial Intelligence Is Far From Matching Humans, Panel Says
From ACM News

Artificial Intelligence Is Far From Matching Humans, Panel Says

Never mind Terminator-like killer robots. Artificial intelligence researchers are grappling with more realistic questions like whether their creations will take...

How the Constant Threat of War Shaped Israel's Tech Industry
From ACM Careers

How the Constant Threat of War Shaped Israel's Tech Industry

Unit 8200 is Israel's most mysterious agency. No one outside knows exactly how it operates, who works there, or how they learn.

What's Driving Silicon Valley to Become 'radicalized'
From ACM Careers

What's Driving Silicon Valley to Become 'radicalized'

Like many Silicon Valley start-ups, Larry Gadea's company collects heaps of sensitive data from his customers.

China Quietly Targets ­.s. Tech Companies in Security Reviews
From ACM Careers

China Quietly Targets ­.s. Tech Companies in Security Reviews

Chinese authorities are quietly scrutinizing technology products sold in China by Apple and other big foreign companies, focusing on whether they pose potential...

America Is 'Dropping Cyberbombs'—But How Do They Work?
From ACM News

America Is 'Dropping Cyberbombs'—But How Do They Work?

Recently, United States Deputy Defense Secretary Robert Work publicly confirmed that the Pentagon’s Cyber Command was "dropping cyberbombs," taking its ongoing...

Stanford Study Finds Telephone Metadata Reveals Sensitive Personal Information
From ACM Careers

Stanford Study Finds Telephone Metadata Reveals Sensitive Personal Information

Stanford researchers show that telephone metadata can alone reveal a surprising amount of personal detail. The work could help inform future policies for government...

The Ipad Has Arrived to (someday) Change Baseball Forever
From ACM Careers

The Ipad Has Arrived to (someday) Change Baseball Forever

Minutes before the Seattle Mariners and Oakland Athletics trot onto the field during an overcast May afternoon, A's bullpen coach Scott Emerson strides along the...

We Know Where You Live
From ACM Careers

We Know Where You Live

Researchers have shown that the location stamps on just a handful of Twitter posts can disclose the addresses of the poster's home and workplace to a relatively...

Hackers Find Dozens of Ways into Pentagon Servers—With Permission
From ACM Careers

Hackers Find Dozens of Ways into Pentagon Servers—With Permission

The Pentagon asked hackers to take a crack at its servers, and in response 1,400 hackers found 90 ways in, according to a tweet from the CEO of HackerOne on Friday...

Cybersecurity Sleuths Learn to Think Like Hackers
From ACM Careers

Cybersecurity Sleuths Learn to Think Like Hackers

About 35 high-school students sit at neatly arranged rows of tables in the university's gym. Another 115 college-level contestants surround the high schoolers.

How to Hack the Hackers: The Human Side of Cyber Crime
From ACM News

How to Hack the Hackers: The Human Side of Cyber Crime

Say what you will about cybercriminals, says Angela Sasse, "their victims rave about the customer service".

Pentagon Turns to Silicon Valley For Edge in Artificial Intelligence
From ACM News

Pentagon Turns to Silicon Valley For Edge in Artificial Intelligence

In its quest to maintain a United States military advantage, the Pentagon is aggressively turning to Silicon Valley’s hottest technology—artificial intelligence...

Not So Safe: Security Software Can Put Computers at Risk
From ACM Careers

Not So Safe: Security Software Can Put Computers at Risk

New research from Concordia University shows security software might actually make online computing less safe.

Phoney but Real Protection For Passwords
From ACM Careers

Phoney but Real Protection For Passwords

A proposed system called Phoney uses honeywords, or false passwords, to protect compromised systems.

What Cyberwar Against Isis Should Look Like
From ACM Opinion

What Cyberwar Against Isis Should Look Like

Pentagon officials have publicly said, in recent weeks, that they're hitting ISIS not only with bullets and bombs but also with cyberoffensive operations.

Apple Services Shut Down in China in Startling About-Face
From ACM Careers

Apple Services Shut Down in China in Startling About-Face

For years, there has been a limit to the success of American technology companies in China. Capture too much market share or wield too much influence, and Beijing...

Rules For Cyberwarfare Still ­nclear, Even as ­.s. Engages In It
From ACM News

Rules For Cyberwarfare Still ­nclear, Even as ­.s. Engages In It

When Defense Secretary Ashton Carter landed in Iraq for a surprise visit this week, he came armed with this news: More than 200 additional U.S. troops are headed...

Lawful Hacking: Should, or Can, the Fbi Learn to Overcome Encryption Itself?
From ACM Careers

Lawful Hacking: Should, or Can, the Fbi Learn to Overcome Encryption Itself?

U.S. lawmakers Tuesday once again brought Apple, the FBI, security experts and law enforcement officials to testify on the ongoing debate over encryption and the...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account