Sign In

Communications of the ACM

Careers


Featured Job

Security for Multirobot Systems
From ACM Careers

Security for Multirobot Systems

Researchers have developed a technique for preventing malicious hackers from commandeering robot teams' communication networks.

Research Examines Susceptibility to Cyberattacks Through Brain Activity, Eye Gaze
From ACM Careers

Research Examines Susceptibility to Cyberattacks Through Brain Activity, Eye Gaze

Researchers are using neuroimaging to observe what happens in Internet users' brains when they encounter malware warnings or malicious websites.

This Entrepreneur Dares You to Hack His Gadgets
From ACM Opinion

This Entrepreneur Dares You to Hack His Gadgets

Serial entrepreneur Andrew "Bunnie" Huang believes that consumer product companies should make their hardware designs publicly available so that anyone can study...

Using Game Theory to Predict Cyberattacks
From ACM Careers

Using Game Theory to Predict Cyberattacks

A new game theory algorithm could one day help detect election tampering.

Blockchain: A Better Way to Track Pork Chops, Bonds, Bad Peanut Butter?
From ACM Careers

Blockchain: A Better Way to Track Pork Chops, Bonds, Bad Peanut Butter?

Frank Yiannas has spent years looking in vain for a better way to track lettuce, steaks and snack cakes from farm and factory to the shelves of Walmart, where he...

NSA Risks Talent Exodus Amid Morale Slump, Trump Fears
From ACM Careers

NSA Risks Talent Exodus Amid Morale Slump, Trump Fears

The National Security Agency risks a brain-drain of hackers and cyber spies due to a tumultuous reorganization and worries about the acrimonious relationship between...

How the Media Are Using Encryption Tools to Collect Anonymous Tips
From ACM Careers

How the Media Are Using Encryption Tools to Collect Anonymous Tips

There was a time when a whistleblower had to rely on the Postal Service, or a pay phone, or an underground parking garage to leak to the press.

Trump Inspires Encryption Boom in Leaky D.C.
From ACM Careers

Trump Inspires Encryption Boom in Leaky D.C.

Poisonous political divisions have spawned an encryption arms race across the Trump administration, as both the president’s advisers and career civil servants scramble...

The Former Secretary of Defense Outlines the Future of Warfare
From ACM Opinion

The Former Secretary of Defense Outlines the Future of Warfare

To an engineer in Silicon Valley, the Defense Department can look a little old, a little slow, and a little fat.

Turning Back DDoS Attacks
From ACM Careers

Turning Back DDoS Attacks

The U.S. Department of Homeland Security's Science and Technology Directorate is funding several research projects that will help defenders turn away distributed...

Army Lab Integrates Future Soldier Technology
From ACM Careers

Army Lab Integrates Future Soldier Technology

Lighter weight protective body armor and undergarments, newer uniform fabrics, conformal wearable computers, and integrated sensors are all part of the U.S. Army's...

IT Decisions Makers and Executives Don't Agree on Cyber Security Responsibility
From ACM Careers

IT Decisions Makers and Executives Don't Agree on Cyber Security Responsibility

There's a severe disconnect between IT decision makers and C-suite executives when it comes to handling cyber attacks. Namely, both believe the other one is responsible...

Hacker Knows Best: Privacy Tips from Kevin Mitnick
From ACM Opinion

Hacker Knows Best: Privacy Tips from Kevin Mitnick

Kevin Mitnick knows all the ways your privacy could be violated through your phone, computer and tablet.

New Office Sensors Know When You Leave Your Desk
From ACM Careers

New Office Sensors Know When You Leave Your Desk

About a year ago, in a widely reported story, journalists at British newspaper the Telegraph found little black boxes installed under their desks.

Simulated Ransomware Attack Shows Vulnerability of Industrial Controls
From ACM Careers

Simulated Ransomware Attack Shows Vulnerability of Industrial Controls

Researchers at Georgia Institute of Technology have developed a form of ransomware that was able to take control of a simulated water treatment plant. The simulated...

How Do Israel's Tech Firms Do Business in Saudi Arabia? Very Quietly
From ACM Careers

How Do Israel's Tech Firms Do Business in Saudi Arabia? Very Quietly

Over the course of 30 years working in Israeli intelligence, Shmuel Bar immersed himself in the hermeneutics of terrorism.

Protecting Bulk Power Systems from Hackers
From ACM Careers

Protecting Bulk Power Systems from Hackers

Reliability measures of electrical grid is a crucial step towards improving its security.

Cryptoparties Teach Attendees How to Stay Anonymous Online
From ACM Careers

Cryptoparties Teach Attendees How to Stay Anonymous Online

Don't expect balloons and singing at a cryptoparty.

Sandia Adds Augmented Reality to Training Toolbox
From ACM Careers

Sandia Adds Augmented Reality to Training Toolbox

Computer scientists have adapted augmented reality headsets to enhance physical security training and analysis at Sandia National Laboratories.

Federal Workers Turn to Encryption to Thwart Trump
From ACM Careers

Federal Workers Turn to Encryption to Thwart Trump

Federal employees worried that President Donald Trump will gut their agencies are creating new email addresses, signing up for encrypted messaging apps and looking...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account
Featured Jobs

Other Jobs

More Jobs    
Read CACM in a free mobile app!
Access the latest issue, plus archived issues and more
ACM Logo
  • ACM CACM apps available for iPad, iPhone and iPod Touch, and Android platforms
  • ACM Digital Library apps available for iOS, Android, and Windows devices
  • Download an app and sign in to it with your ACM Web Account
Find the app for your mobile device
ACM DL Logo