acm-header
Sign In

Communications of the ACM

Careers


Featured Job
bg-corner

Colin Powell's E-Mail Tips: ­se Private Phone Line, Personal Aol Account… and Keep Mouth Shut
From ACM Careers

Colin Powell's E-Mail Tips: ­se Private Phone Line, Personal Aol Account… and Keep Mouth Shut

In an e-mail exchange with then-incoming Secretary of State Hillary Clinton, former Secretary of State Colin Powell warned that the State Department Diplomatic...

Does the Messaging Service Telegram Take Privacy Too Far?
From ACM News

Does the Messaging Service Telegram Take Privacy Too Far?

The encryption of digital information is considered the best protection against hackers, snoops or potential enemies looking to poke around into private exchanges...

The Fbi's Latest Mission: Be Cool Enough to Recruit Hackers
From ACM Careers

The Fbi's Latest Mission: Be Cool Enough to Recruit Hackers

The FBI has struggled for years to attract enough fresh hacker talent to defend America's computers.

How Spy Tech Firms Let Governments See Everything on a Smartphone
From ACM News

How Spy Tech Firms Let Governments See Everything on a Smartphone

Want to invisibly spy on 10 iPhone owners without their knowledge? Gather their every keystroke, sound, message and location?

This Is Your Company on Blockchain
From ACM Careers

This Is Your Company on Blockchain

You don't have to be an expert on digital currencies like bitcoin to be intrigued by the potential of the technology underlying them. Blockchain, as it’s called...

G.e., the 124-Year-Old Software Start-­p
From ACM Careers

G.e., the 124-Year-Old Software Start-­p

It may not qualify as a lightning-bolt eureka moment, but Jeffrey R. Immelt, chief executive of General Electric, recalls the June day in 2009 that got him thinking...

Bounty Hunters Are Legally Hacking Apple and the Pentagon–for Big Money
From ACM Careers

Bounty Hunters Are Legally Hacking Apple and the Pentagon–for Big Money

Nathaniel Wakelam became a bounty hunter when he was 18.

Happy 25th Birthday to the World Wide Web
From ACM News

Happy 25th Birthday to the World Wide Web

Internauts, today we celebrate this glorious technology that brings us all together! On August 23, 1991--25 years ago today--the public gained access for the first...

98 Personal Data Points that Facebook ­ses to Target Ads to You
From ACM News

98 Personal Data Points that Facebook ­ses to Target Ads to You

Say you're scrolling through your Facebook Newsfeed and you encounter an ad so eerily well-suited, it seems someone has possibly read your brain.

The Wretched, Endless Cycle of Bitcoin Hacks
From ACM Careers

The Wretched, Endless Cycle of Bitcoin Hacks

It seemed bitcoin exchange Bitfinex was doing all the right things. In the end, that didn’t stop hackers from stealing $65 million.

Why Facebook Is Really Blocking the Ad Blockers
From ACM Opinion

Why Facebook Is Really Blocking the Ad Blockers

Ads can seem like the bane of the Internet.

No One Wants to Buy Those Stolen Nsa-Linked 'cyberweapons'
From ACM Careers

No One Wants to Buy Those Stolen Nsa-Linked 'cyberweapons'

When an anonymous group calling itself Shadow Brokers put up for auction a collection of data it said it stole from the NSA, the group wrote that it would make...

Bitcoin's Technology Has a Surprising Fan: IBM
From ACM Careers

Bitcoin's Technology Has a Surprising Fan: IBM

Bitcoin has a bad rap as the preferred currency of drug dealers. But that isn't stopping IBM and some of the world's most conservative businesses from tapping into...

Envisioning Bitcoin's Technology at the Heart of Global Finance
From ACM Careers

Envisioning Bitcoin's Technology at the Heart of Global Finance

A new report from the World Economic Forum predicts that the underlying technology introduced by the virtual currency Bitcoin will come to occupy a central place...

Dhs Awards $1.3 Million to Small Businesses For Cyber Security R&d
From ACM Careers

Dhs Awards $1.3 Million to Small Businesses For Cyber Security R&d

The U.S. Department of Homeland Security (DHS) Science and Technology Directorate has awarded $1.3 million to 13 small businesses for the development of new cyber...

Why Save a Computer Virus?
From ACM Opinion

Why Save a Computer Virus?

On average, 82,000 new malware threats are created each day.

Don't Baby These Kid Hackers
From ACM Careers

Don't Baby These Kid Hackers

Emmett Brewer is no taller than the lectern on the stage, so he stands to the side of it to deliver his presentation. He's got a Dennis the Menace hairdo and he's...

Are Performance-Monitoring Wearables an Affront to Workers' Rights?
From ACM Careers

Are Performance-Monitoring Wearables an Affront to Workers' Rights?

At U.K. supermarket chain Tesco, workers wear sensor-bearing armbands to track inventory while unloading goods. 

This Company Has Built a Profile on Every American Adult
From ACM Careers

This Company Has Built a Profile on Every American Adult

Forget telephoto lenses and fake mustaches: The most important tools for America's 35,000 private investigators are database subscription services.

Apple's New Privacy Technology May Pressure Competitors to Better Protect Our Data
From ACM Careers

Apple's New Privacy Technology May Pressure Competitors to Better Protect Our Data

Ten years ago, researchers at Microsoft introduced a breakthrough approach to protecting privacy in the age of big data. Later this year their idea, known as differential...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account