acm-header
Sign In

Communications of the ACM

Careers


Featured Job
bg-corner

Brain's Reaction to Certain Words Could Replace Passwords
From ACM Careers

Brain's Reaction to Certain Words Could Replace Passwords

You might not need to remember complicated e-mail and bank account passwords much longer. A new study suggests that your brain's response to certain words could...

Behind the Downfall at Blackberry
From ACM Opinion

Behind the Downfall at Blackberry

Ever since Jim Balsillie and Mike Lazaridis stepped down as co-chairmen and co-chief executives of BlackBerry, neither has spoken much in public about the once-dominant...

Inside Google's Secret War Against Ad Fraud
From ACM Careers

Inside Google's Secret War Against Ad Fraud

In a conference room nine floors above London's St. Giles High Street, a Russian engineer named Sasha booted up a computer and began giving me instructions.

This Little 3D Printed Robot Cracks Combination Locks in 30 Seconds
From ACM News

This Little 3D Printed Robot Cracks Combination Locks in 30 Seconds

Careful what you leave in your lockers, high school students and gym-goers.

The Trouble with Reference Rot
From ACM News

The Trouble with Reference Rot

The scholarly literature is meant to be a permanent record of science.

Quantum Computers Will Make Your Laptop Look Like an Abacus
From ACM Opinion

Quantum Computers Will Make Your Laptop Look Like an Abacus

The race to make the first quantum computer is becoming as important as the race 75 years ago to get the first nuke. It could change the balance of power in politics...

'Fingerprinting' Chips to Fight Counterfeiting
From ACM Careers

'Fingerprinting' Chips to Fight Counterfeiting

Verayo, an MIT spinout, uses random variations in silicon chips as authentication identifiers for consumer products.

How to Crack Many Master Lock Combinations in Eight Tries or Less
From ACM Careers

How to Crack Many Master Lock Combinations in Eight Tries or Less

There's a vulnerability in Master Lock branded padlocks that allows anyone to learn the combination in eight or fewer tries, a process that requires less than two...

Facebook Is Eating the Internet
From ACM Careers

Facebook Is Eating the Internet

Facebook, it seems, is unstoppable. The social publishing site, just 11 years old, is now the dominant force in American media.

As Demand Grows, Midwestern Colleges Prep Students to Fly Drones
From ACM Careers

As Demand Grows, Midwestern Colleges Prep Students to Fly Drones

On the night of May 4, 2007, a tornado classified as a 5 on the Enhanced Fujita Scale reached the town of Greensburg, Kansas.

Preparing For Warfare in Cyberspace
From ACM Opinion

Preparing For Warfare in Cyberspace

The Pentagon’s new 33-page cybersecurity strategy is an important evolution in how America proposes to address a top national security threat. It is intended to...

Advancing Security and Trust in Reconfigurable Devices
From ACM Careers

Advancing Security and Trust in Reconfigurable Devices

A research team at the Georgia Tech Research Institute is studying a range of security challenges involving field programmable gate arrays.

In Nato Cyber Wargame, Berlya Fends Off Arch-Enemy Crimsonia
From ACM News

In Nato Cyber Wargame, Berlya Fends Off Arch-Enemy Crimsonia

Somewhere near Iceland, a new NATO member, Berlya is under cyber-attack, most likely launched from its arch-rival Crimsonia, although the Berlyans can’t be completely...

Just How Hackable Is Your Plane?
From ACM Careers

Just How Hackable Is Your Plane?

Chris Roberts knows a lot about hacking planes. But not because he's trying to make them fall out of the sky.

Researchers Test Brain Activity to Identify Cybersecurity Threats
From ACM Careers

Researchers Test Brain Activity to Identify Cybersecurity Threats

Iowa State University researchers measured brain activity to identify what might motivate an employee to violate company policy and sell or trade sensitive information...

Cloud Security Reaches Silicon
From ACM Careers

Cloud Security Reaches Silicon

MIT researchers have implemented in silicon a system for defending against memory-access attacks.

Homeland Security Is Laying Roots in Silicon Valley, and You Might Not Like Its Reasons
From ACM Careers

Homeland Security Is Laying Roots in Silicon Valley, and You Might Not Like Its Reasons

The Department of Homeland Security plans to open an office in California's Silicon Valley to recruit talent from the technology sector and build relationships...

Security Professionals Stymied By Outdated Visualization Tools
From ACM Careers

Security Professionals Stymied By Outdated Visualization Tools

Earlier this year, the film Blackhat got high marks for realistic scenes in which hackers and information security specialists work at their computers to hunt down...

Iowa State Developing Computer Security Literacy Curriculum
From ACM Careers

Iowa State Developing Computer Security Literacy Curriculum

Iowa State University researchers are developing a computer security literacy curriculum designed for middle school and high school students.

Iran Cyber Attacks on the Rise
From ACM Careers

Iran Cyber Attacks on the Rise

A team of researchers reports that Iran is emerging as a significant cyberthreat to the United States and its allies, and says Iranian-backed digital attacks targeting...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account