From ACM Careers
Canonical's Open Documentation Academy aims to help newcomers participate in the open source community, offering mentorship and…
BNN| February 28, 2024
When it's time to make sure that communications from and to the aircraft of the president of the United States are safe from eavesdropping, who do you call?CNET From ACM Careers | July 3, 2014
As Hurricane Sandy revealed almost two years ago, New York's 100-year-old subway is not a modern and robust system.Gizmodo From ACM Careers | July 3, 2014
A bipartisan privacy board on Wednesday unanimously adopted its report that endorses some of the National Security Agency's Internet surveillance programs.The Associated Press From ACM News | July 3, 2014
Talk to any talent professional in the Washington region and they'll tell you cybersecurity jobs are among the most difficult for them to fill.The Washington Post From ACM Careers | June 27, 2014
Modern computers are not unlike the looms of the industrial revolution: They follow programmed instructions to weave intricate patterns.The New York Times From ACM News | June 25, 2014
In September 1976, in the midst of the Cold War, Victor Ivanovich Belenko, a disgruntled Soviet pilot, veered off course from a training flight over Siberia in...IEEE Spectrum From ACM News | June 24, 2014
Newly uncovered components of a digital surveillance tool used by more than 60 governments worldwide provide a rare glimpse at the extensive ways law enforcement...Wired From ACM News | June 24, 2014
From driverless cars to delivery drones, a new generation of robots is about to revolutionize the way people work, drive and shop.The New York Times From ACM News | June 20, 2014
Georgia Tech researchers have identified a weakness in one of Android's security features that leaves software components vulnerable to attack.Georgian Institute of Technology From ACM Careers | June 20, 2014
Two Columbia Engineering researchers have discovered a crucial security problem in Google Play, the official Android app store.Columbia University From ACM Careers | June 19, 2014
A growing number of companies are under pressure to protect sensitive data—and not just from hackers lurking outside the digital walls.NPR From ACM Careers | June 18, 2014
To protect your financial and personal data, most mobiles come with PIN-based security, biometrics or number grids that require you to retrace a particular pattern...Scientific American From ACM News | June 17, 2014
Researchers at MIT are developing a protocol they call "HTTP with Accountability" (HTTPA) which will automatically monitor the transmission of private data and...MIT News From ACM Careers | June 13, 2014
Enough with complaining that young people these days are addicted to their phones. The question you should be asking is: What do they know that you don't?The Wall Street Journal From ACM Opinion | June 11, 2014
The potential value of turning U.S. freeways into "smart transportation systems" is enormous. But they have a worrisome downside: They are vulnerable to cyberattacks...Vanderbilt University From ACM Careers | June 11, 2014
Richard Clarke served as the nation's top counterterrorism official under presidents Bill Clinton and George W. Bush before resigning in 2003 in protest of the...Democracy Now! From ACM Opinion | June 9, 2014