acm-header
Sign In

Communications of the ACM

Careers


Featured Job
bg-corner

Building Blocks Focus on Email Security and Piv Credentials
From ACM Careers

Building Blocks Focus on Email Security and Piv Credentials

NIST  has proposed two new cybersecurity building blocks, one to help organizations improve the security of email, the other to enable mobile devices to provide...

Machine Ethics: The Robot's Dilemma
From ACM News

Machine Ethics: The Robot's Dilemma

In his 1942 short story 'Runaround', science-fiction writer Isaac Asimov introduced the Three Laws of Robotics—engineering safeguards and built-in ethical principles...

No Internet? No Problem. Inside Cuba's Tech Revolution
From ACM Careers

No Internet? No Problem. Inside Cuba's Tech Revolution

Robin Pedraja, a lanky 28-year-old former design student from Havana, walked into the Cuban government’s office of periodicals and publications early last year...

What Washington Really Knows About the Internet of Things
From ACM News

What Washington Really Knows About the Internet of Things

President Barack Obama wears a FitBit monitor on his wrist to count his steps and calories, and has waxed poetic about the power of wearable technology to "give...

Mit’s Bitcoin-Inspired 'enigma' Lets Computers Mine Encrypted Data
From ACM Careers

Mit’s Bitcoin-Inspired 'enigma' Lets Computers Mine Encrypted Data

The cryptography behind bitcoin solved a paradoxical problem: a currency with no regulator, that nonetheless can't be counterfeited.

When a Company Is Put ­p For Sale, in Many Cases, Your Personal Data Is, Too
From ACM News

When a Company Is Put ­p For Sale, in Many Cases, Your Personal Data Is, Too

The privacy policy for Hulu, a video-streaming service with about nine million subscribers, opens with a declaration that the company "respects your privacy."

Nist Revises Key Computer Security Publication on Random Number Generation
From ACM Careers

Nist Revises Key Computer Security Publication on Random Number Generation

In response to public concerns about cryptographic security, NIST has formally revised its recommended methods for generating random numbers, a crucial element...

Naval Research Funding to Bolster Cyber Defense
From ACM Careers

Naval Research Funding to Bolster Cyber Defense

Nearly $2 million from the U.S. Department of the Navy Office of Naval Research and the Assistant Secretary of Defense for Research and Engineering will fund...

How the ­.s. Finally Tracked Down a Hacker Kingpin
From ACM News

How the ­.s. Finally Tracked Down a Hacker Kingpin

For the U.S., the extradition of Ercan Findikoglu shows the value of patience when it comes to pursuing suspected hacker kingpins.

Iris Recognition Gives Smartphone ­sers More Security Options, Researcher Says
From ACM Careers

Iris Recognition Gives Smartphone ­sers More Security Options, Researcher Says

Iris recognition systems give people more options to protect their electronic devices, says Stephanie Schuckers, Paynter-Krigman Professor in Engineering Science...

'epic' Fail—how Opm Hackers Tapped the Mother Lode of Espionage Data
From ACM News

'epic' Fail—how Opm Hackers Tapped the Mother Lode of Espionage Data

Government officials have been vague in their testimony about the data breaches—there was apparently more than one—at the Office of Personnel Management.

How to Spot Home-Grown Isis Recruits Online Before They Leave
From ACM Careers

How to Spot Home-Grown Isis Recruits Online Before They Leave

Britain's youngest suicide bomber. That is how the name Talha Asmal was introduced to the public last week.

U.s. 'export Rules' Threaten Research
From ACM Careers

U.s. 'export Rules' Threaten Research

The U.S. government is considering policy changes that could dramatically affect how researchers handle equipment and information that have national-security implications...

Vietnam's Mobile Revolution Catapults Millions Into the Digital Age
From ACM Careers

Vietnam's Mobile Revolution Catapults Millions Into the Digital Age

To get an idea of how the mobile Web is catapulting millions of people into the digital age by skipping landline connections, have a look at Vietnam.

U.s. Surveillance Backlash Could Cost Tech Companies More Than $35 Billion By 2016
From ACM Careers

U.s. Surveillance Backlash Could Cost Tech Companies More Than $35 Billion By 2016

The U.S. government's widespread data surveillance practices are likely to cost U.S. cloud computing and other technology companies more money than originally expected...

Image Software Spots Links in Tattoo Ink
From ACM News

Image Software Spots Links in Tattoo Ink

In an unusual twist on biometrics research, US computer scientists have joined with law-enforcement officials to find new ways to automatically detect tattoos on...

Apple's Latest Selling Point: How Little It Knows About You
From ACM Careers

Apple's Latest Selling Point: How Little It Knows About You

Apple wants its devices to know everything about you. But more than ever, it wants you to know that Apple doesn't know what those devices know.

Who Wins in a Data Breach? Cybersecurity Firms–and Their Investors
From ACM Careers

Who Wins in a Data Breach? Cybersecurity Firms–and Their Investors

FireEye Inc., a Silicon Valley-based cybersecurity firm, held an analyst day on Wednesday, doing its best (as all companies do) to build its case for the Street...

Stopping Malware
From ACM Careers

Stopping Malware

The U.S. Department of Homeland Security Science and Technology Directorate Cyber Security Division has made it a top priority to develop tools to prevent malware...

Computer Scientists Are Astir After Baidu Team Is Barred From A.i. Competition
From ACM News

Computer Scientists Are Astir After Baidu Team Is Barred From A.i. Competition

A group of researchers at the Chinese web services company Baidu have been barred from participating in an international competition for artificial intelligence...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account