acm-header
Sign In

Communications of the ACM

Careers


Featured Job
bg-corner

How Big Data Could Help Identify the Next Felon—or Blame the Wrong Guy
From ACM Careers

How Big Data Could Help Identify the Next Felon—or Blame the Wrong Guy

Think of it as big data meets "Minority Report."

A New 'dawn' in Exchanges' War on Hackers
From ACM News

A New 'dawn' in Exchanges' War on Hackers

When prices on some U.S. stocks suddenly zoomed one day last month and others unexpectedly plunged, stock-market officials set out to detect a possible computer...

Owner of Snowden's Email Service on Why He Closed Lavabit Rather Than Comply With Gov't
From ACM Opinion

Owner of Snowden's Email Service on Why He Closed Lavabit Rather Than Comply With Gov't

Lavabit, an encrypted email service believed to have been used by National Security Agency leaker Edward Snowden, has abruptly shut down.

Encryption Is Less Secure Than We Thought
From ACM Careers

Encryption Is Less Secure Than We Thought

Since 1948, when Claude Shannon's seminal paper on information theory first appeared, most information-theoretic analyses of secure schemes have depended on a common...

As New Targets For Hackers, Your Car and Your House
From ACM News

As New Targets For Hackers, Your Car and Your House

Imagine driving on the freeway at 60 miles per hour and your car suddenly screeches to a halt, causing a pileup that injures dozens of people.

Google to Quintuple Some Bug Bounties
From ACM Careers

Google to Quintuple Some Bug Bounties

Two million bucks doled out in increments of a few hundred to a few thousand dollars is no quick way to make a fortune.

Cybersecurity Pros in High Demand, Highly Paid, and Highly Selective
From ACM TechNews

Cybersecurity Pros in High Demand, Highly Paid, and Highly Selective

The demand for cybersecurity professionals is outpacing other technology jobs by a wide margin, according to a Semper Secure survey. Cybersecurity professionals...

Attracting the Next Cybersecurity Pros
From ACM TechNews

Attracting the Next Cybersecurity Pros

Winnie Callahan, director for business, education, government, and health innovations at the University of Southern California Viterbi's Information Sciences Institute...

Pgp Inventor and Silent Circle Co-Founder Phil Zimmermann on the Surveillance Society
From ACM Opinion

Pgp Inventor and Silent Circle Co-Founder Phil Zimmermann on the Surveillance Society

Phil Zimmermann might be a technologist, but he tends to get philosophical when it comes to the issues of privacy and security and how they intersect with our society...

The Science Behind the Netflix Algorithms That Decide What You'll Watch Next
From ACM News

The Science Behind the Netflix Algorithms That Decide What You'll Watch Next

If you liked 1960s Star Trek, the first non-Trek title that Netflix is likely to suggest to you is the original Mission: Impossible series (the one with the cool...

Nsa to Cut System Administrators By 90 Percent to Limit Data Access
From ACM News

Nsa to Cut System Administrators By 90 Percent to Limit Data Access

The U.S. National Security Agency, hit by disclosures of classified data by former contractor Edward Snowden, said Thursday it intends to eliminate about 90 percent...

Silent Circle Follows Lavabit in Shuttering Encrypted Email
From ACM News

Silent Circle Follows Lavabit in Shuttering Encrypted Email

Silent Circle shuttered its encrypted email service on Thursday, the second such closure in just a few hours in an apparent attempt to avoid government scrutiny...

The Five Scariest Hacks We Saw Last Week
From ACM News

The Five Scariest Hacks We Saw Last Week

If something can connect to a network, it can be hacked. Computers and phones are still popular targets, but increasingly so are cars, home security systems, TVs...

Nsa Revelations Could Hurt Collaboration with 'betrayed' Hackers
From ACM Careers

Nsa Revelations Could Hurt Collaboration with 'betrayed' Hackers

The U.S. government's efforts to recruit talented hackers could suffer from the recent revelations about its vast domestic surveillance programs, as many private...

Crypto Experts Issue a Call to Arms to Avert the Cryptopocalypse
From ACM News

Crypto Experts Issue a Call to Arms to Avert the Cryptopocalypse

At the Black Hat security conference in Las Vegas, a quartet of researchers, Alex Stamos, Tom Ritter, Thomas Ptacek, and Javed Samuel, implored everyone involved...

Fbi Taps Hacker Tactics to Spy on Suspects
From ACM News

Fbi Taps Hacker Tactics to Spy on Suspects

Law-enforcement officials in the U.S. are expanding the use of tools routinely used by computer hackers to gather information on suspects, bringing the criminal...

NSA Announces Winner of Its First Annual 'Science of Security Competition'
From ACM Careers

NSA Announces Winner of Its First Annual 'Science of Security Competition'

A research paper that was highlighted last year at an international symposium is the winner of the National Security Agency's first annual Science of Security (SoS)...

Miscreants of the Internet Love to Torture Brian Krebs
From ACM Opinion

Miscreants of the Internet Love to Torture Brian Krebs

What is Brian Krebs?

Mail from the (velvet) Cybercrime ­nderground
From ACM Opinion

Mail from the (velvet) Cybercrime ­nderground

Over the past six months, "fans" of this Web site and its author have shown their affection in some curious ways.

Government Can Grab Cell Phone Location Records Without Warrant, Appeals Court Says
From ACM News

Government Can Grab Cell Phone Location Records Without Warrant, Appeals Court Says

In a major victory for the Justice Department over privacy advocates, a federal appeals court ruled Tuesday that government agencies can collect records showing...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account