acm-header
Sign In

Communications of the ACM

Careers


Featured Job
bg-corner

China to Restrict Drone, Supercomputer Exports
From ACM News

China to Restrict Drone, Supercomputer Exports

China will restrict the export of drones and supercomputers from Aug. 15 to help protect national security out of fears such equipment could fall into the hands...

Click Here to Hack the Network
From ACM Careers

Click Here to Hack the Network

This week is hacker week in Las Vegas. The desert playground is hosting three conferences dedicated to computer security—Black Hat USA, Def Con, and BSides LV.

The Cyber-Mechanics Who Protect Your Car from Hackers
From ACM Careers

The Cyber-Mechanics Who Protect Your Car from Hackers

A couple of weeks ago, a small team of security researchers gathered near a car parked outside one of their company’s buildings.

For Sympathetic Ear, More Chinese Turn to Smartphone Program
From ACM News

For Sympathetic Ear, More Chinese Turn to Smartphone Program

She is known as Xiaoice, and millions of young Chinese pick up their smartphones every day to exchange messages with her, drawn to her knowing sense of humor and...

Politics Overshadows U.s. Tech Firms' Hopes For Entering Iran
From ACM Careers

Politics Overshadows U.s. Tech Firms' Hopes For Entering Iran

Iran has the potential to be a boom market for American tech companies.

New Email Archive Tool to Sift Literary Legacies
From ACM Careers

New Email Archive Tool to Sift Literary Legacies

The leather-bound diaries of a 19th-century high-school principal in southwestern India are helping change how archivists around the world handle email.

Hackers Can Disable a Sniper Rifle—Or Change Its Target
From ACM News

Hackers Can Disable a Sniper Rifle—Or Change Its Target

Put a computer on a sniper rifle, and it can turn the most amateur shooter into a world-class marksman.

Shoring Up Tor
From ACM Careers

Shoring Up Tor

Researchers mount successful attacks against Tor, the popular anonymity network, and show how to prevent them.

The Secret Agents Who Stake Out the ­gliest Corners of the Internet
From ACM News

The Secret Agents Who Stake Out the ­gliest Corners of the Internet

When President Obama launched his Twitter account in May, people noticed his rapid accumulation of followers, a silly back-and-forth with President Clinton, but...

The Hidden Lab Where Bankcards Are Hacked
From ACM Careers

The Hidden Lab Where Bankcards Are Hacked

It couldn't get any more steampunk if it tried: a wooden robot hisses like an airbrake as a blast of compressed air shoves its arm sideways, sending a credit card...

Facebook, a Big User of Apple Machines, Writes and Open Sources Its Own Mac Os Security Software
From ACM Careers

Facebook, a Big User of Apple Machines, Writes and Open Sources Its Own Mac Os Security Software

When Facebook Inc. engineers needed security software to monitor the thousands of Apple Inc. Mac laptops, they couldn't find what they needed.

The Tools Inspectors Can Use to Catch Iran's Nuclear Hijinks
From ACM News

The Tools Inspectors Can Use to Catch Iran's Nuclear Hijinks

After Tuesday's historic agreement between Iran and the "P5+1" group of countries, inspectors from the International Atomic Energy Agency will have access to all...

Archiving Tech Scans Mobile Apps For Copyright Infringing Content
From ACM Careers

Archiving Tech Scans Mobile Apps For Copyright Infringing Content

The U.S. Department of Homeland Security Science and Technology Directorate has expanded the capability of its mobile apps archiving technology to track copyright...

Coders Balk at Making Apps Searchable
From ACM Careers

Coders Balk at Making Apps Searchable

The giants of the Web have been pressing developers of mobile apps to index their content so it can be parsed by search engines or linked to from other sites.

Data Breaches Boost Funding For Cybersecurity Startups
From ACM Careers

Data Breaches Boost Funding For Cybersecurity Startups

Before Max Krohn, the OkCupid co-founder, played online matchmaker, he had a far-less-romantic interest in cryptography. But he couldn't see a way to make a living...

Here Are Eff's Most Influential Cases from Its First 25 Years
From ACM News

Here Are Eff's Most Influential Cases from Its First 25 Years

On Friday, July 10, the Electronic Frontier Foundation celebrated its 25th anniversary.

Lawrence Livermore Licenses Computer Network Security Tool
From ACM Careers

Lawrence Livermore Licenses Computer Network Security Tool

A computer network security tool developed by Lawrence Livermore National Laboratory computer scientists and engineers has been licensed to Cambridge Global Advisors...

Moxie Marlinspike: The Coder Who Encrypted Your Texts
From ACM Opinion

Moxie Marlinspike: The Coder Who Encrypted Your Texts

In the past decade, Moxie Marlinspike has squatted on an abandoned island, toured the U.S. by hopping trains, he says, and earned the enmity of government officials...

Seven Teams Reach 2016 DARPA Cyber Grand Challenge Finals
From ACM Careers

Seven Teams Reach 2016 DARPA Cyber Grand Challenge Finals

Seven teams have earned the right to compete in the finals of DARPA’s Cyber Grand Challenge, a tournament designed to speed the development of automated security...

Csail Report: Giving Government Special Access to Data Poses Major Security Risks
From ACM Careers

Csail Report: Giving Government Special Access to Data Poses Major Security Risks

Granting governments access to encrypted data would increase data security concerns, the authors of a new report say.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account