Sign In

Communications of the ACM

Careers


FOR JOB SEEKERS Search for Jobs     Post a Resume     Create a Job Alert     View Featured Jobs    
FOR EMPLOYERS Post a Job     View Resumes     Advertise with Us     Contact Us
Refine your search:
subjectSecurity
Featured Job

New In Careers


This Little 3D Printed Robot Cracks Combination Locks in 30 Seconds
From ACM News

This Little 3D Printed Robot Cracks Combination Locks in 30 Seconds

Careful what you leave in your lockers, high school students and gym-goers.

The Trouble with Reference Rot
From ACM News

The Trouble with Reference Rot

The scholarly literature is meant to be a permanent record of science.

Quantum Computers Will Make Your Laptop Look Like an Abacus
From ACM Opinion

Quantum Computers Will Make Your Laptop Look Like an Abacus

The race to make the first quantum computer is becoming as important as the race 75 years ago to get the first nuke. It could change the balance of power in politics...

'Fingerprinting' Chips to Fight Counterfeiting
From ACM Careers

'Fingerprinting' Chips to Fight Counterfeiting

Verayo, an MIT spinout, uses random variations in silicon chips as authentication identifiers for consumer products.

How to Crack Many Master Lock Combinations in Eight Tries or Less
From ACM Careers

How to Crack Many Master Lock Combinations in Eight Tries or Less

There's a vulnerability in Master Lock branded padlocks that allows anyone to learn the combination in eight or fewer tries, a process that requires less than two...

Facebook Is Eating the Internet
From ACM Careers

Facebook Is Eating the Internet

Facebook, it seems, is unstoppable. The social publishing site, just 11 years old, is now the dominant force in American media.

As Demand Grows, Midwestern Colleges Prep Students to Fly Drones
From ACM Careers

As Demand Grows, Midwestern Colleges Prep Students to Fly Drones

On the night of May 4, 2007, a tornado classified as a 5 on the Enhanced Fujita Scale reached the town of Greensburg, Kansas.

Preparing for Warfare in Cyberspace
From ACM Opinion

Preparing for Warfare in Cyberspace

The Pentagon’s new 33-page cybersecurity strategy is an important evolution in how America proposes to address a top national security threat. It is intended to...

Advancing Security and Trust in Reconfigurable Devices
From ACM Careers

Advancing Security and Trust in Reconfigurable Devices

A research team at the Georgia Tech Research Institute is studying a range of security challenges involving field programmable gate arrays.

In NATO Cyber Wargame, Berlya Fends Off Arch-Enemy Crimsonia
From ACM News

In NATO Cyber Wargame, Berlya Fends Off Arch-Enemy Crimsonia

Somewhere near Iceland, a new NATO member, Berlya is under cyber-attack, most likely launched from its arch-rival Crimsonia, although the Berlyans can’t be completely...

Just How Hackable Is Your Plane?
From ACM Careers

Just How Hackable Is Your Plane?

Chris Roberts knows a lot about hacking planes. But not because he's trying to make them fall out of the sky.

Researchers Test Brain Activity to Identify Cybersecurity Threats
From ACM Careers

Researchers Test Brain Activity to Identify Cybersecurity Threats

Iowa State University researchers measured brain activity to identify what might motivate an employee to violate company policy and sell or trade sensitive information...

Cloud Security Reaches Silicon
From ACM Careers

Cloud Security Reaches Silicon

MIT researchers have implemented in silicon a system for defending against memory-access attacks.

Homeland Security Is Laying Roots in Silicon Valley, and You Might Not Like Its Reasons
From ACM Careers

Homeland Security Is Laying Roots in Silicon Valley, and You Might Not Like Its Reasons

The Department of Homeland Security plans to open an office in California's Silicon Valley to recruit talent from the technology sector and build relationships...

Security Professionals Stymied by Outdated Visualization Tools
From ACM Careers

Security Professionals Stymied by Outdated Visualization Tools

Earlier this year, the film Blackhat got high marks for realistic scenes in which hackers and information security specialists work at their computers to hunt down...

Iowa State Developing Computer Security Literacy Curriculum
From ACM Careers

Iowa State Developing Computer Security Literacy Curriculum

Iowa State University researchers are developing a computer security literacy curriculum designed for middle school and high school students.

Iran Cyber Attacks on the Rise
From ACM Careers

Iran Cyber Attacks on the Rise

A team of researchers reports that Iran is emerging as a significant cyberthreat to the United States and its allies, and says Iranian-backed digital attacks targeting...

Fighting the Next Generation of Cyberattacks
From ACM Careers

Fighting the Next Generation of Cyberattacks

The U.S. Department of Defense has provided a $3 million grant to a team of computer scientists to develop a software analyzer that can thwart so-called algorithmic...

How the Computer Got Its Revenge on the Soviet Union
From ACM News

How the Computer Got Its Revenge on the Soviet Union

In 1950, with the Cold War in full swing, Soviet journalists were looking desperately for something to help them fill their anti-American propaganda quota.

DHS Expands Mobile App Archiving Technology
From ACM Careers

DHS Expands Mobile App Archiving Technology

The U.S. Department of Homeland Security Science and Technology Directorate is expanding its mobile application archiving technology across all major mobile apps...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account