From ACM Careers
Canonical's Open Documentation Academy aims to help newcomers participate in the open source community, offering mentorship and…
BNN| February 28, 2024
When prices on some U.S. stocks suddenly zoomed one day last month and others unexpectedly plunged, stock-market officials set out to detect a possible computer...The Wall Street Journal From ACM News | August 16, 2013
Lavabit, an encrypted email service believed to have been used by National Security Agency leaker Edward Snowden, has abruptly shut down.Democracy Now! From ACM Opinion | August 14, 2013
Since 1948, when Claude Shannon's seminal paper on information theory first appeared, most information-theoretic analyses of secure schemes have depended on a common...MIT News From ACM Careers | August 14, 2013
Imagine driving on the freeway at 60 miles per hour and your car suddenly screeches to a halt, causing a pileup that injures dozens of people.The New York Times From ACM News | August 13, 2013
Two million bucks doled out in increments of a few hundred to a few thousand dollars is no quick way to make a fortune.CNET From ACM Careers | August 13, 2013
The demand for cybersecurity professionals is outpacing other technology jobs by a wide margin, according to a Semper Secure survey. Cybersecurity professionals...CIO From ACM TechNews | August 12, 2013
Winnie Callahan, director for business, education, government, and health innovations at the University of Southern California Viterbi's Information Sciences Institute...GovInfoSecurity.com From ACM TechNews | August 12, 2013
Phil Zimmermann might be a technologist, but he tends to get philosophical when it comes to the issues of privacy and security and how they intersect with our society...GigaOm From ACM Opinion | August 12, 2013
If you liked 1960s Star Trek, the first non-Trek title that Netflix is likely to suggest to you is the original Mission: Impossible series (the one with the cool...Wired From ACM News | August 9, 2013
The U.S. National Security Agency, hit by disclosures of classified data by former contractor Edward Snowden, said Thursday it intends to eliminate about 90 percent...Reuters From ACM News | August 9, 2013
Silent Circle shuttered its encrypted email service on Thursday, the second such closure in just a few hours in an apparent attempt to avoid government scrutiny...CNET From ACM News | August 9, 2013
If something can connect to a network, it can be hacked. Computers and phones are still popular targets, but increasingly so are cars, home security systems, TVs...CNN From ACM News | August 6, 2013
The U.S. government's efforts to recruit talented hackers could suffer from the recent revelations about its vast domestic surveillance programs, as many private...Reuters From ACM Careers | August 6, 2013
At the Black Hat security conference in Las Vegas, a quartet of researchers, Alex Stamos, Tom Ritter, Thomas Ptacek, and Javed Samuel, implored everyone involved...ArsTechnica From ACM News | August 5, 2013
Law-enforcement officials in the U.S. are expanding the use of tools routinely used by computer hackers to gather information on suspects, bringing the criminal...The Wall Street Journal From ACM News | August 2, 2013
A research paper that was highlighted last year at an international symposium is the winner of the National Security Agency's first annual Science of Security (SoS)...National Security Agency From ACM Careers | August 1, 2013
Over the past six months, "fans" of this Web site and its author have shown their affection in some curious ways.Krebs on Security From ACM Opinion | July 31, 2013
In a major victory for the Justice Department over privacy advocates, a federal appeals court ruled Tuesday that government agencies can collect records showing...NBC News From ACM News | July 31, 2013