acm-header
Sign In

Communications of the ACM

Careers


Featured Job
bg-corner

Making IoT Configuration More Secure and Easy-to-Use
From ACM Careers

Making IoT Configuration More Secure and Easy-to-Use

Researchers from the University of Southampton have identified easy-to-use techniques to configure Internet of Things objects, to make them more secure and help...

Dhs Awards $10.4m in Mobile Security Research Contracts
From ACM Careers

Dhs Awards $10.4m in Mobile Security Research Contracts

The U.S. Department of Homeland Security Science and Technology Directorate has announced $10.4 million in cybersecurity Mobile Technology Security R&D awards...

NSF Grant Funds Research on Wearable Device Security
From ACM Careers

NSF Grant Funds Research on Wearable Device Security

Two Wichita State University professors have been awarded a $380,000 grant from the U.S. National Science Foundation to investigate cybersecurity and privacy...

Putin vs. the Internet: The Laws That Matter
From ACM News

Putin vs. the Internet: The Laws That Matter

A new law in force in Russia from Sept. 1 is intended to force foreign Internet firms to maintain local servers to handle data on Russian citizens.

7 Technology Trends that Will Make or Break Many Careers
From ACM Careers

7 Technology Trends that Will Make or Break Many Careers

No matter what field you work in, if you're hoping to get ahead in your career, you need to be mindful of technology trends.

The Government Needs to Work with Silicon Valley to Create Our Military Future
From ACM Opinion

The Government Needs to Work with Silicon Valley to Create Our Military Future

In 1931, the city fathers of Sunnyvale, California, came up with a unique plan to rescue their town from the doldrums of the Great Depression.

Connecting Your Car to Your Smartphone Can Make Auto Data Work For You
From ACM Careers

Connecting Your Car to Your Smartphone Can Make Auto Data Work For You

If your car could talk, you might be surprised by how much it has to say.

Social Is Dead: What 146 Startup Pitches Showed Me about the Next Wave of Tech Companies
From ACM Careers

Social Is Dead: What 146 Startup Pitches Showed Me about the Next Wave of Tech Companies

Investing in startups is like bird-watching, or at least that's the quote from legendary venture capitalist Mike Moritz.

Robokiller Wins Ftc Prize By Annihilating Robocalls
From ACM Careers

Robokiller Wins Ftc Prize By Annihilating Robocalls

A new technology called "RoboKiller" has won a $25,000 grand prize from the Federal Trade Commission in the agency's "Robocalls: Humanity Strikes Back" contest...

International Contest Asks Hackers to Write 'evil' Code
From ACM Careers

International Contest Asks Hackers to Write 'evil' Code

While most hackathons and programming contests encourage participants to develop usable software, a contest hosted by Binghamton University's Scott Craver asks...

Kaspersky Lab: Based In Russia, Doing Cybersecurity In The West
From ACM Careers

Kaspersky Lab: Based In Russia, Doing Cybersecurity In The West

Given Russia's cyber skills, it's not surprising that a Russian entrepreneur, Eugene Kaspersky, runs one of the world's leading companies offering protection from...

Why Larry Page Is Stepping Away
From ACM Opinion

Why Larry Page Is Stepping Away

In the ten years that I’ve been watching him, Larry Page has always wanted to play by his own rules.

The Man Making Puzzles For Hackers
From ACM Careers

The Man Making Puzzles For Hackers

If you want to know how to keep 16,000 geeks entertained, ask the Lost Boy aka Ryan Clarke.

Cyberattacks as Significant as Traditional Threats, Says Battleship Manufacturer
From ACM News

Cyberattacks as Significant as Traditional Threats, Says Battleship Manufacturer

Warfare is increasingly being fought from behind computer screens rather than on the battlefield, forcing weapons manufacturers to consider the myriad of threats...

How Fiction Can Reveal the Horrors of Future Wars
From ACM Opinion

How Fiction Can Reveal the Horrors of Future Wars

The fact that he couldn't feel the drill going into the back of his skull made the noise all the more terrifying.

U.s. Researchers Show Computers Can Be Hijacked to Send Data As Sound Waves
From ACM Careers

U.s. Researchers Show Computers Can Be Hijacked to Send Data As Sound Waves

A team of security researchers has demonstrated the ability to hijack standard equipment inside computers, printers and millions of other devices in order to send...

Caution ­rged Over Editing Dna in Wildlife (intentionally or Not)
From ACM News

Caution ­rged Over Editing Dna in Wildlife (intentionally or Not)

"Crap!" That was the first word out of Kevin Esvelt’s mouth as he scanned a paper1 published inScience last March.

Facing Islamic State Threat, Iraq Digitizes National Library
From ACM Careers

Facing Islamic State Threat, Iraq Digitizes National Library

The dimly lit, dust-caked stacks of the Baghdad National Library hide a treasure of the ages: crinkled, yellowing papers holding the true stories of sultans and...

China to Restrict Drone, Supercomputer Exports
From ACM News

China to Restrict Drone, Supercomputer Exports

China will restrict the export of drones and supercomputers from Aug. 15 to help protect national security out of fears such equipment could fall into the hands...

Click Here to Hack the Network
From ACM Careers

Click Here to Hack the Network

This week is hacker week in Las Vegas. The desert playground is hosting three conferences dedicated to computer security—Black Hat USA, Def Con, and BSides LV.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account