acm-header
Sign In

Communications of the ACM

Careers


Featured Job
bg-corner

How Air Force One's Communications Are 'hardened'
From ACM Careers

How Air Force One's Communications Are 'hardened'

When it's time to make sure that communications from and to the aircraft of the president of the United States are safe from eavesdropping, who do you call?

Inside the Secret Building That's Bringing Cell Service To Nyc's Subway
From ACM Careers

Inside the Secret Building That's Bringing Cell Service To Nyc's Subway

As Hurricane Sandy revealed almost two years ago, New York's 100-year-old subway is not a modern and robust system.

Panel Endorses Some Nsa Internet Surveillance
From ACM News

Panel Endorses Some Nsa Internet Surveillance

A bipartisan privacy board on Wednesday unanimously adopted its report that endorses some of the National Security Agency's Internet surveillance programs.

This Startup Is Trying to Create—and Control—the Internet of Your Home
From ACM Careers

This Startup Is Trying to Create—and Control—the Internet of Your Home

Alex Hawkinson's house knows how to make his day.

E-Voting Experiments End in Norway Amid Security Fears
From ACM News

E-Voting Experiments End in Norway Amid Security Fears

Norway is ending trials of e-voting systems used in national and local elections.

An Argument That the Shortage of Cyber Workers Is a Problem That Will Solve Itself
From ACM Careers

An Argument That the Shortage of Cyber Workers Is a Problem That Will Solve Itself

Talk to any talent professional in the Washington region and they'll tell you cybersecurity jobs are among the most difficult for them to fill.

Microsoft Makes Bet Quantum Computing Is Next Breakthrough
From ACM News

Microsoft Makes Bet Quantum Computing Is Next Breakthrough

Modern computers are not unlike the looms of the industrial revolution: They follow programmed instructions to weave intricate patterns.

Introducing the Vacuum Transistor: A Device Made of Nothing
From ACM News

Introducing the Vacuum Transistor: A Device Made of Nothing

In September 1976, in the midst of the Cold War, Victor Ivanovich Belenko, a disgruntled Soviet pilot, veered off course from a training flight over Siberia in...

Researchers Find and Decode the Spy Tools Governments ­se to Hijack Phones
From ACM News

Researchers Find and Decode the Spy Tools Governments ­se to Hijack Phones

Newly uncovered components of a digital surveillance tool used by more than 60 governments worldwide provide a rare glimpse at the extensive ways law enforcement...

­nblinking Eyes Track Employees
From ACM Careers

­nblinking Eyes Track Employees

A digital Big Brother is coming to work, for better or worse.

As Robotics Advances, Worries of Killer Robots Rise
From ACM News

As Robotics Advances, Worries of Killer Robots Rise

From driverless cars to delivery drones, a new generation of robots is about to revolutionize the way people work, drive and shop.

Research Identifies Android Security Weaknesses Caused by Performance Design
From ACM Careers

Research Identifies Android Security Weaknesses Caused by Performance Design

Georgia Tech researchers have identified a weakness in one of Android's security features that leaves software components vulnerable to attack.

Team Finds Thousands of Secret Keys in Android Apps
From ACM Careers

Team Finds Thousands of Secret Keys in Android Apps

Two Columbia Engineering researchers have discovered a crucial security problem in Google Play, the official Android app store.

Losing the Key
From ACM Careers

Losing the Key

In this age of rapid transformation, the house key has been surprisingly resistant to change.

Software That Sees Employees, Not Outsiders, As the Real Threat
From ACM Careers

Software That Sees Employees, Not Outsiders, As the Real Threat

A growing number of companies are under pressure to protect sensitive data—and not just from hackers lurking outside the digital walls.

Squiggly Lines Secure Smartphones
From ACM News

Squiggly Lines Secure Smartphones

To protect your financial and personal data, most mobiles come with PIN-based security, biometrics or number grids that require you to retrace a particular pattern...

Who's Using Your Data?
From ACM Careers

Who's Using Your Data?

Researchers at MIT are developing a protocol they call "HTTP with Accountability" (HTTPA) which will automatically monitor the transmission of private data and...

How to ­se Tech Like a Teenager
From ACM Opinion

How to ­se Tech Like a Teenager

Enough with complaining that young people these days are addicted to their phones. The question you should be asking is: What do they know that you don't?

Guarding Against 'Carmageddon' Cyberattacks
From ACM Careers

Guarding Against 'Carmageddon' Cyberattacks

The potential value of turning U.S. freeways into "smart transportation systems" is enormous. But they have a worrisome downside: They are vulnerable to cyberattacks...

Former Counterterrorism Czar Richard Clarke: ­.s. Drone Program ­nder Obama 'got Out of Hand'
From ACM Opinion

Former Counterterrorism Czar Richard Clarke: ­.s. Drone Program ­nder Obama 'got Out of Hand'

Richard Clarke served as the nation's top counterterrorism official under presidents Bill Clinton and George W. Bush before resigning in 2003 in protest of the...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account