U.S. Department of Homeland SecurityArmy TimesNational Defense The Associated PressUniversity of TexasBBC NewsAmerican Enterprise InstituteIEEE SpectrumBusiness WeekComputerworldWashington University in St. LouisXinhua News AgencyCIOWBAL BaltimoreDefense Advanced Research Projects AgencyUniversity of KentuckyLawrence Livermore National LaboratoryeWeekComputerWeekly.comThe Baltimore Sun
Featured Job
Learn a Language While You Text
From ACM Careers
An MIT graduate student's "WaitChatter" app teaches vocabulary during moments in between text and instant-message replies.
MIT CSAIL| May 15, 2015
New In Careers
From ACM News
This Little 3D Printed Robot Cracks Combination Locks in 30 Seconds
Careful what you leave in your lockers, high school students and gym-goers.Wired From ACM News | May 15, 2015
From ACM News
The Trouble with Reference Rot
The scholarly literature is meant to be a permanent record of science.Nature From ACM News | May 6, 2015
From ACM Opinion
Quantum Computers Will Make Your Laptop Look Like an Abacus
The race to make the first quantum computer is becoming as important as the race 75 years ago to get the first nuke. It could change the balance of power in politics...Newsweek From ACM Opinion | May 4, 2015
From ACM Careers
'Fingerprinting' Chips to Fight Counterfeiting
Verayo, an MIT spinout, uses random variations in silicon chips as authentication identifiers for consumer products.MIT News From ACM Careers | May 1, 2015
From ACM Careers
How to Crack Many Master Lock Combinations in Eight Tries or Less
There's a vulnerability in Master Lock branded padlocks that allows anyone to learn the combination in eight or fewer tries, a process that requires less than two...Ars Technica From ACM Careers | April 30, 2015
From ACM Careers
Facebook Is Eating the Internet
Facebook, it seems, is unstoppable. The social publishing site, just 11 years old, is now the dominant force in American media.The Atlantic From ACM Careers | April 29, 2015
From ACM Careers
As Demand Grows, Midwestern Colleges Prep Students to Fly Drones
On the night of May 4, 2007, a tornado classified as a 5 on the Enhanced Fujita Scale reached the town of Greensburg, Kansas.Ars Technica From ACM Careers | April 29, 2015
From ACM Opinion
Preparing for Warfare in Cyberspace
The Pentagon’s new 33-page cybersecurity strategy is an important evolution in how America proposes to address a top national security threat. It is intended to...The New York Times From ACM Opinion | April 28, 2015
From ACM Careers
Advancing Security and Trust in Reconfigurable Devices
A research team at the Georgia Tech Research Institute is studying a range of security challenges involving field programmable gate arrays.Georgia Institute of Technology From ACM Careers | April 28, 2015
From ACM News
In NATO Cyber Wargame, Berlya Fends Off Arch-Enemy Crimsonia
Somewhere near Iceland, a new NATO member, Berlya is under cyber-attack, most likely launched from its arch-rival Crimsonia, although the Berlyans can’t be completely...The Wall Street Journal From ACM News | April 24, 2015
From ACM Careers
Just How Hackable Is Your Plane?
Chris Roberts knows a lot about hacking planes. But not because he's trying to make them fall out of the sky.The Washington Post From ACM Careers | April 24, 2015
From ACM Careers
Researchers Test Brain Activity to Identify Cybersecurity Threats
Iowa State University researchers measured brain activity to identify what might motivate an employee to violate company policy and sell or trade sensitive information...Iowa State University From ACM Careers | April 23, 2015
From ACM Careers
Cloud Security Reaches Silicon
MIT researchers have implemented in silicon a system for defending against memory-access attacks.MIT News From ACM Careers | April 23, 2015
From ACM Careers
Homeland Security Is Laying Roots in Silicon Valley, and You Might Not Like Its Reasons
The Department of Homeland Security plans to open an office in California's Silicon Valley to recruit talent from the technology sector and build relationships...The Washington Post From ACM Careers | April 23, 2015
From ACM Careers
Security Professionals Stymied by Outdated Visualization Tools
Earlier this year, the film Blackhat got high marks for realistic scenes in which hackers and information security specialists work at their computers to hunt down...The Wall Street Journal From ACM Careers | April 22, 2015
From ACM Careers
Iowa State Developing Computer Security Literacy Curriculum
Iowa State University researchers are developing a computer security literacy curriculum designed for middle school and high school students.Iowa State University From ACM Careers | April 22, 2015
A team of researchers reports that Iran is emerging as a significant cyberthreat to the United States and its allies, and says Iranian-backed digital attacks targeting...American Enterprise Institute From ACM Careers | April 17, 2015
From ACM Careers
Fighting the Next Generation of Cyberattacks
The U.S. Department of Defense has provided a $3 million grant to a team of computer scientists to develop a software analyzer that can thwart so-called algorithmic...University of Utah From ACM Careers | April 17, 2015
In 1950, with the Cold War in full swing, Soviet journalists were looking desperately for something to help them fill their anti-American propaganda quota.Nautilus From ACM News | April 14, 2015
From ACM Careers
DHS Expands Mobile App Archiving Technology
The U.S. Department of Homeland Security Science and Technology Directorate is expanding its mobile application archiving technology across all major mobile apps...U.S. DHS Science & Technology Directorate From ACM Careers | April 14, 2015