acm-header
Sign In

Communications of the ACM

Careers


Featured Job
bg-corner

Pgp Inventor and Silent Circle Co-Founder Phil Zimmermann on the Surveillance Society
From ACM Opinion

Pgp Inventor and Silent Circle Co-Founder Phil Zimmermann on the Surveillance Society

Phil Zimmermann might be a technologist, but he tends to get philosophical when it comes to the issues of privacy and security and how they intersect with our society...

Nsa to Cut System Administrators By 90 Percent to Limit Data Access
From ACM News

Nsa to Cut System Administrators By 90 Percent to Limit Data Access

The U.S. National Security Agency, hit by disclosures of classified data by former contractor Edward Snowden, said Thursday it intends to eliminate about 90 percent...

Silent Circle Follows Lavabit in Shuttering Encrypted Email
From ACM News

Silent Circle Follows Lavabit in Shuttering Encrypted Email

Silent Circle shuttered its encrypted email service on Thursday, the second such closure in just a few hours in an apparent attempt to avoid government scrutiny...

Fledgling 3D Printing Industry Finds Home in Nyc
From ACM Careers

Fledgling 3D Printing Industry Finds Home in Nyc

It looks like a bakery. A warm glow emanates from the windows of big, oven-like machines, and a dusting of white powder covers everything.

The Five Scariest Hacks We Saw Last Week
From ACM News

The Five Scariest Hacks We Saw Last Week

If something can connect to a network, it can be hacked. Computers and phones are still popular targets, but increasingly so are cars, home security systems, TVs...

Nsa Revelations Could Hurt Collaboration with 'betrayed' Hackers
From ACM Careers

Nsa Revelations Could Hurt Collaboration with 'betrayed' Hackers

The U.S. government's efforts to recruit talented hackers could suffer from the recent revelations about its vast domestic surveillance programs, as many private...

Crypto Experts Issue a Call to Arms to Avert the Cryptopocalypse
From ACM News

Crypto Experts Issue a Call to Arms to Avert the Cryptopocalypse

At the Black Hat security conference in Las Vegas, a quartet of researchers, Alex Stamos, Tom Ritter, Thomas Ptacek, and Javed Samuel, implored everyone involved...

Fbi Taps Hacker Tactics to Spy on Suspects
From ACM News

Fbi Taps Hacker Tactics to Spy on Suspects

Law-enforcement officials in the U.S. are expanding the use of tools routinely used by computer hackers to gather information on suspects, bringing the criminal...

From ACM Opinion

Google's Science Fellows Challenge the Company's Fund-Raising For Senator Inhofe

Ten years ago this week, Senator James M. Inhofe, the Republican from Oklahoma, used a two-hour floor speech to launch his campaign on the credibility of climate...

NSA Announces Winner of Its First Annual 'Science of Security Competition'
From ACM Careers

NSA Announces Winner of Its First Annual 'Science of Security Competition'

A research paper that was highlighted last year at an international symposium is the winner of the National Security Agency's first annual Science of Security (SoS)...

Miscreants of the Internet Love to Torture Brian Krebs
From ACM Opinion

Miscreants of the Internet Love to Torture Brian Krebs

What is Brian Krebs?

Mail from the (velvet) Cybercrime ­nderground
From ACM Opinion

Mail from the (velvet) Cybercrime ­nderground

Over the past six months, "fans" of this Web site and its author have shown their affection in some curious ways.

Government Can Grab Cell Phone Location Records Without Warrant, Appeals Court Says
From ACM News

Government Can Grab Cell Phone Location Records Without Warrant, Appeals Court Says

In a major victory for the Justice Department over privacy advocates, a federal appeals court ruled Tuesday that government agencies can collect records showing...

Zeroing In on ­nbreakable Computer Security
From ACM News

Zeroing In on ­nbreakable Computer Security

The news out of Moscow of late has been dominated by Edward Snowden, the American leaker of secret state documents who is currently seeking temporary asylum in...

Software Experts Attack Cars, to Release Code As Hackers Meet
From ACM News

Software Experts Attack Cars, to Release Code As Hackers Meet

Car hacking is not a new field, but its secrets have long been closely guarded.

Nsa Growth Fueled By Need to Target Terrorists
From ACM News

Nsa Growth Fueled By Need to Target Terrorists

Twelve years later, the cranes and earthmovers around the National Security Agency are still at work, tearing up pavement and uprooting trees to make room for a...

How Samsung Is Beating Apple in China
From ACM Careers

How Samsung Is Beating Apple in China

Apple Chief Executive Tim Cook believes that "over the arc of time" China is a huge opportunity for his pathbreaking company. But time looks to be on the side of...

Big Data Analysis Adds to Guest Worker Debate
From ACM Careers

Big Data Analysis Adds to Guest Worker Debate

Although certain kinds of engineers are in short supply in the United States, plenty of potential candidates exist for thousands of positions for which companies...

Bill Gates on the Future of Education, Programming, and Just About Everything Else
From ACM TechNews

Bill Gates on the Future of Education, Programming, and Just About Everything Else

At Microsoft's recent Faculty Summit, Bill Gates expressed his views on a range of topics, including education, patents, computer science, and machine learning....

Your Creative, Open Hackathon Is Ripe For Legal Challenges
From ACM Opinion

Your Creative, Open Hackathon Is Ripe For Legal Challenges

NASA's Space Apps Challenge recently became the world's largest open hackathon, with over 8,000 participants spanning 44 countries.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account