acm-header
Sign In

Communications of the ACM

Careers


Featured Job
bg-corner

Iowa State Developing Computer Security Literacy Curriculum
From ACM Careers

Iowa State Developing Computer Security Literacy Curriculum

Iowa State University researchers are developing a computer security literacy curriculum designed for middle school and high school students.

Iran Cyber Attacks on the Rise
From ACM Careers

Iran Cyber Attacks on the Rise

A team of researchers reports that Iran is emerging as a significant cyberthreat to the United States and its allies, and says Iranian-backed digital attacks targeting...

Fighting the Next Generation of Cyberattacks
From ACM Careers

Fighting the Next Generation of Cyberattacks

The U.S. Department of Defense has provided a $3 million grant to a team of computer scientists to develop a software analyzer that can thwart so-called algorithmic...

How the Computer Got Its Revenge on the Soviet Union
From ACM News

How the Computer Got Its Revenge on the Soviet Union

In 1950, with the Cold War in full swing, Soviet journalists were looking desperately for something to help them fill their anti-American propaganda quota.

Dhs Expands Mobile App Archiving Technology
From ACM Careers

Dhs Expands Mobile App Archiving Technology

The U.S. Department of Homeland Security Science and Technology Directorate is expanding its mobile application archiving technology across all major mobile apps...

Air Force's Secret 'gorgon Stare' Program Leaves Terrorists Nowhere To Hide
From ACM News

Air Force's Secret 'gorgon Stare' Program Leaves Terrorists Nowhere To Hide

In Greek mythology, Gorgons were creatures whose terrible visages could turn men to stone with a single glance.

U.s. Nuclear Fears Block Intel China Supercomputer Update
From ACM News

U.s. Nuclear Fears Block Intel China Supercomputer Update

The U.S. government has refused to let Intel help China update the world's biggest supercomputer.

Online Test-Takers Feel Anti-Cheating Software's ­neasy Glare
From ACM Careers

Online Test-Takers Feel Anti-Cheating Software's ­neasy Glare

Before Betsy Chao, a senior here at Rutgers University, could take midterm exams in her online courses this semester, her instructors sent emails directing students...

Jay Edelson, the Class-Action Lawyer Who May Be Tech's Least Friended Man
From ACM Careers

Jay Edelson, the Class-Action Lawyer Who May Be Tech's Least Friended Man

When technology executives imagine the boogeyman, they see a baby-face guy in wire-rim glasses. His name is Jay Edelson.

Planes Without Pilots
From ACM News

Planes Without Pilots

Mounting evidence that the co-pilot crashed a Germanwings plane into a French mountain has prompted a global debate about how to better screen crewmembers for mental...

Toolkits For the Mind
From ACM Opinion

Toolkits For the Mind

When the Japanese computer scientist Yukihiro Matsumoto decided to create Ruby, a programming language that has helped build Twitter, Hulu, and much of the modern...

After Snowden, the Nsa Faces Recruitment Challenge
From ACM Careers

After Snowden, the Nsa Faces Recruitment Challenge

Daniel Swann is exactly the type of person the National Security Agency would love to have working for it.

Technology Turns Gestures Into Smartphone Security Component
From ACM Careers

Technology Turns Gestures Into Smartphone Security Component

Technology turns user's gestures into a smartphone's strongest security component.

A Brief History of the Atm
From ACM Careers

A Brief History of the Atm

Eyes glaze over when I mention my interest in researching automated teller machines.

Why Kevin Mitnick, the World's Most Notorious Hacker, Is Still Breaking Into Computers
From ACM Careers

Why Kevin Mitnick, the World's Most Notorious Hacker, Is Still Breaking Into Computers

Look no further than Kevin Mitnick's business card to see how some things never change.

How Crashing Drones Are Exposing Secrets About ­.s. War Operations
From ACM News

How Crashing Drones Are Exposing Secrets About ­.s. War Operations

Crashing drones are spilling secrets about U.S. military operations.

Teams Prep For Mid-Atlantic Collegiate Cyber Defense Competition
From ACM Careers

Teams Prep For Mid-Atlantic Collegiate Cyber Defense Competition

College students from 10 mid-Atlantic schools will defend a virtual mass transportation computer system against full-scale cyberattacks at the 10th Annual National...

Complex, Legacy Code Creates Security Headaches for Microsoft Users
From ACM Careers

Complex, Legacy Code Creates Security Headaches for Microsoft Users

Some of the biggest hacking episodes of the last few years, from Target Corp. to Home Depot Inc., share a common thread. Microsoft Corp. platforms were involved...

The Big Business of Smashing Bugs
From ACM Careers

The Big Business of Smashing Bugs

Frans Rosén is a tech entrepreneur by day and a bug bounty hunter by night.

DARPA Program Aims to Ensure Online Privacy Through Technology
From ACM Careers

DARPA Program Aims to Ensure Online Privacy Through Technology

DARPA has announced plans to research and develop tools for online privacy in an effort to help individuals, enterprises, and U.S. government agencies protect...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account