acm-header
Sign In

Communications of the ACM

Careers


Featured Job
bg-corner

Rules For Cyberwarfare Still ­nclear, Even as ­.s. Engages In It
From ACM News

Rules For Cyberwarfare Still ­nclear, Even as ­.s. Engages In It

When Defense Secretary Ashton Carter landed in Iraq for a surprise visit this week, he came armed with this news: More than 200 additional U.S. troops are headed...

Lawful Hacking: Should, or Can, the Fbi Learn to Overcome Encryption Itself?
From ACM Careers

Lawful Hacking: Should, or Can, the Fbi Learn to Overcome Encryption Itself?

U.S. lawmakers Tuesday once again brought Apple, the FBI, security experts and law enforcement officials to testify on the ongoing debate over encryption and the...

Apple Refused China Request For Source Code in Last Two Years: Lawyer
From ACM Careers

Apple Refused China Request For Source Code in Last Two Years: Lawyer

Apple Inc has been asked by Chinese authorities within the last two years to hand over its source code but refused, the company's top lawyer told lawmakers on Tuesday...

Patching ­p Web Applications
From ACM Careers

Patching ­p Web Applications

By exploiting some peculiarities of the popular Web programming framework Ruby on Rails, MIT researchers have developed a system that can quickly comb through tens...

All Hail Facebook's Mark Zuckerberg, King of the Bots
From ACM Opinion

All Hail Facebook's Mark Zuckerberg, King of the Bots

Mark Zuckerberg was once the boy king of Silicon Valley. Now he wants to be the bot king of Silicon Valley.

Arms Control Groups ­rge Human Control of Robot Weaponry
From ACM News

Arms Control Groups ­rge Human Control of Robot Weaponry

Two international arms control groups on Monday issued a report that called for maintaining human control over a new generation of weapons that are increasingly...

Universities Aren't Doing Enough to Train the Cyberdefenders America Desperately Needs
From ACM Careers

Universities Aren't Doing Enough to Train the Cyberdefenders America Desperately Needs

The threat of hacking seems to lurk around every corner, but American universities may not be doing enough to prepare the next generation of cyberdefenders.

Dear Silicon Valley: The Pentagon Has Sent You a Friend Request
From ACM Careers

Dear Silicon Valley: The Pentagon Has Sent You a Friend Request

When Defense Secretary Ashton Carter first spoke about the Pentagon's startup in Silicon Valley, the former Harvard physicist said he had great expectations.

Why the Nba Slapped the Wrist of Matthew Dellavedova
From ACM Careers

Why the Nba Slapped the Wrist of Matthew Dellavedova

Something seemed off about Cleveland Cavaliers point guard Matthew Dellavedova during last Thursday night's game against the Brooklyn Nets.

Top ­.s. ­ndergraduate Computer Science Programs Skip Cybersecurity Classes
From ACM Careers

Top ­.s. ­ndergraduate Computer Science Programs Skip Cybersecurity Classes

None of the top 10 U.S. university computer science and engineering program degrees requires students take a cybersecurity course.

Hacker-For-Hire Market Is Booming, Says New Report
From ACM Careers

Hacker-For-Hire Market Is Booming, Says New Report

It's becoming cheaper than ever to buy hacking tools online.

Research Enhances Cybersecurity via Rapid Ip Address Change
From ACM Careers

Research Enhances Cybersecurity via Rapid Ip Address Change

Research exploiting the abundance of addresses available in the new IPv6 to enhance cybersecurity by changing a networked device's IP address repeatedly at a very...

Apple Still Strong at 40, But Are Best Years Behind It?
From ACM Careers

Apple Still Strong at 40, But Are Best Years Behind It?

Apple turned 40 on Friday, and it's a very different company from the audacious startup that Steve Jobs and Steve Wozniak launched in a Silicon Valley garage in...

'hack the Pentagon' Pilot Program Opens For Registration
From ACM Careers

'hack the Pentagon' Pilot Program Opens For Registration

The Pentagon has opened registration for the "Hack the Pentagon" bug bounty program designed to identify security vulnerabilities of U.S. Department of Defense...

Apple Bruised
From ACM Careers

Apple Bruised

Did Apple win? Or the U.S. government? Neither did.

Should Hackers Help the F.b.i.?
From ACM Opinion

Should Hackers Help the F.b.i.?

The United States Justice Department announced this week that it was able to unlock the iPhone used by the gunman in the San Bernardino shooting in December, and...

Beijing Seeks to Tighten Reins on Websites in China
From ACM Careers

Beijing Seeks to Tighten Reins on Websites in China

China's government said on Monday that it would take steps to more strictly manage websites in the country, its latest push to set boundaries in the wider Internet...

Shadowy Hacking Industry May Be Helping Fbi Crack an Iphone
From ACM Careers

Shadowy Hacking Industry May Be Helping Fbi Crack an Iphone

Turns out there's a shadowy global industry devoted to breaking into smartphones and extracting their information.

Shuffling May Be Best Cybersecurity Defense
From ACM Careers

Shuffling May Be Best Cybersecurity Defense

A team of George Mason researchers proposes a "moving-target" defense against distributed denial-of-service attacks. The defense works by repeatedly shuffling client...

Israeli Firm Helping Fbi to Open Encrypted Iphone: Report
From ACM Careers

Israeli Firm Helping Fbi to Open Encrypted Iphone: Report

Israel's Cellebrite, a provider of mobile forensic software, is helping the U.S. Federal Bureau of Investigation's attempt to unlock an iPhone used by one of the...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account