acm-header
Sign In

Communications of the ACM

Careers


Featured Job
bg-corner

From ACM News

What The Fbi Wants In A Social Media Monitoring App

The FBI has raised eyebrows in the tech world with a public document that asks for advice on how to harvest information from social networking sites.

Call For Cyberwar 'peacekeepers' Force
From ACM Careers

Call For Cyberwar 'peacekeepers' Force

There will soon be a need for a world peacekeeping force in cyberspace, according to John Bumgarner, an official with the U.S. Cyber Consequences Unit in Washington...

Drexel Lab Releases Software to Discern and Disguise Authorship
From ACM Careers

Drexel Lab Releases Software to Discern and Disguise Authorship

Computer engineers at Drexel University developed a pair of open-source software programs that could help protect the free speech of whistle-blowers, protestors...

What Hacker Apprenticeships Tell ­S About the Future of Education
From ACM Careers

What Hacker Apprenticeships Tell ­S About the Future of Education

Three very similar compressed software development training programs have emerged in the past few months: Code Academy (not to be confused with the startup Codecademy)...

Sandia Cyber Project Looks to Help It Professionals with Dns Vulnerabilities
From ACM Careers

Sandia Cyber Project Looks to Help It Professionals with Dns Vulnerabilities

Sandia National Laboratories' Casey Deccio has developed a visualization tool known as DNSViz to help network administrators within the federal government and global...

Stephen Hawking's New Pc
From ACM Opinion

Stephen Hawking's New Pc

Intel application engineer Travis Bonifield has been working closely with Hawking to communicate with the world for a decade.

Professor's Signcryption Technology Now An International Standard
From ACM Careers

Professor's Signcryption Technology Now An International Standard

After nearly a three-year process, the research efforts of UNC Charlotte's College of Computing and Informatics' Professor, Yuliang Zheng, have been formally recognized...

Military Academies Look to Fill Nation's Cybersecurity Gaps
From ACM TechNews

Military Academies Look to Fill Nation's Cybersecurity Gaps

U.S. military academies have been developing potential cyberwarriors for years, but has difficulty finding them positions that use their cyberskills. Most graduates...

Civilian Contractors Playing Key Roles in ­.s. Drone Operations
From ACM News

Civilian Contractors Playing Key Roles in ­.s. Drone Operations

After a U.S. airstrike mistakenly killed at least 15 Afghans in 2010, the Army officer investigating the accident was surprised to discover that an American civilian...

Infosec Careers: The New Demands
From ACM Careers

Infosec Careers: The New Demands

A major goal for information security students and institutions should be developing a cultural way of learning, instead of simply studying for tests and doing...

Meet Sopa Author Lamar Smith, Hollywood's Favorite Republican
From ACM News

Meet Sopa Author Lamar Smith, Hollywood's Favorite Republican

Rep. Lamar Smith, whose congressional district in Texas encompasses the cropland and grazing land stretching between Austin and San Antonio, might seem like an...

Gchq Aims to Recruit Computer Hackers with Code-Cracking Web Site
From ACM Careers

Gchq Aims to Recruit Computer Hackers with Code-Cracking Web Site

Government intelligence service targets "self-taught" hackers with cryptic Web site that features no obvious branding.

The Search For Analysts to Make Sense of 'big Data'
From ACM News

The Search For Analysts to Make Sense of 'big Data'

Businesses keep vast troves of data about things like online shopping behavior, or millions of changes in weather patterns, or trillions of financial transactions—information...

­ser Resistance to Password Security Explored
From ACM Careers

­ser Resistance to Password Security Explored

Though most organizations have policies and guidelines to protect their information systems from unauthorized access, research has shown that employee compliance...

Cyber Workshop at Sandia Labs Seeks Potential Responses to Cyberattacks
From ACM Careers

Cyber Workshop at Sandia Labs Seeks Potential Responses to Cyberattacks

The difficulties of defending utilities, commerce and national security against cyberattacks, and what to do to change that situation, were major themes of a recent...

Georgia Tech Turns Iphone Into Spiphone
From ACM Careers

Georgia Tech Turns Iphone Into Spiphone

A research team from Georgia Tech has discovered how to program a smartphone to sense nearby keyboard vibrations and decipher complete sentences with up to 80 percent...

­.va. Team Awarded $3 Million Nsf Secure Computation Grant
From ACM Careers

­.va. Team Awarded $3 Million Nsf Secure Computation Grant

The U.S. National Science Foundation has awarded a $3 million grant to a team lead by University of Virginia computer scientist David Evans for a project to develop...

From ACM News

How Many Security Clearances Have Been Issued?

More than 4.2 million people have security clearances for access to classified information, a number that vastly outstrips previous estimates and nearly rivals...

Cmu's Brumley Receives Prestigious Pecase Award For Cybersecurity Research
From ACM Careers

Cmu's Brumley Receives Prestigious Pecase Award For Cybersecurity Research

Carnegie Mellon University's David Brumley has won a Presidential Early Career Award for Scientists and Engineers — the highest honor bestowed by the U.S. government...

From ACM News

In China, Business Travelers Take Extreme Precautions to Avoid Cyber-Espionage

Packing for business in China? Bring your passport and business cards, but maybe not that laptop loaded with contacts and corporate memos.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account