From ACM Careers
Canonical's Open Documentation Academy aims to help newcomers participate in the open source community, offering mentorship and…
BNN| February 28, 2024
The Weather Channel knows the chance for rain in St. Louis on Friday, what the heat index could reach in Santa Fe on Saturday, and how humid Baltimore may get on...The Wall Street Journal From ACM Careers | August 15, 2013
Lavabit, an encrypted email service believed to have been used by National Security Agency leaker Edward Snowden, has abruptly shut down.Democracy Now! From ACM Opinion | August 14, 2013
When new businesses based on the computer chip began to cluster in Santa Clara Valley, it did not take long for someone to come up with the name Silicon Valley....BBC News From ACM Careers | August 14, 2013
Imagine driving on the freeway at 60 miles per hour and your car suddenly screeches to a halt, causing a pileup that injures dozens of people.The New York Times From ACM News | August 13, 2013
Cash-strapped cities are turning to an unusual source to improve their online services on the cheap: helpful hackers, who use city data to create tools tracking...The Wall Street Journal From ACM Careers | August 13, 2013
Phil Zimmermann might be a technologist, but he tends to get philosophical when it comes to the issues of privacy and security and how they intersect with our society...GigaOm From ACM Opinion | August 12, 2013
The U.S. National Security Agency, hit by disclosures of classified data by former contractor Edward Snowden, said Thursday it intends to eliminate about 90 percent...Reuters From ACM News | August 9, 2013
Silent Circle shuttered its encrypted email service on Thursday, the second such closure in just a few hours in an apparent attempt to avoid government scrutiny...CNET From ACM News | August 9, 2013
It looks like a bakery. A warm glow emanates from the windows of big, oven-like machines, and a dusting of white powder covers everything.The Associated Press From ACM Careers | August 7, 2013
If something can connect to a network, it can be hacked. Computers and phones are still popular targets, but increasingly so are cars, home security systems, TVs...CNN From ACM News | August 6, 2013
The U.S. government's efforts to recruit talented hackers could suffer from the recent revelations about its vast domestic surveillance programs, as many private...Reuters From ACM Careers | August 6, 2013
At the Black Hat security conference in Las Vegas, a quartet of researchers, Alex Stamos, Tom Ritter, Thomas Ptacek, and Javed Samuel, implored everyone involved...ArsTechnica From ACM News | August 5, 2013
Law-enforcement officials in the U.S. are expanding the use of tools routinely used by computer hackers to gather information on suspects, bringing the criminal...The Wall Street Journal From ACM News | August 2, 2013
Ten years ago this week, Senator James M. Inhofe, the Republican from Oklahoma, used a two-hour floor speech to launch his campaign on the credibility of climate...The New York Times From ACM Opinion | August 2, 2013
A research paper that was highlighted last year at an international symposium is the winner of the National Security Agency's first annual Science of Security (SoS)...National Security Agency From ACM Careers | August 1, 2013
Over the past six months, "fans" of this Web site and its author have shown their affection in some curious ways.Krebs on Security From ACM Opinion | July 31, 2013
In a major victory for the Justice Department over privacy advocates, a federal appeals court ruled Tuesday that government agencies can collect records showing...NBC News From ACM News | July 31, 2013
The news out of Moscow of late has been dominated by Edward Snowden, the American leaker of secret state documents who is currently seeking temporary asylum in...Fortune From ACM News | July 30, 2013