acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

Malvertisements Growing as Online Security Threat
From BLOG@CACM

Malvertisements Growing as Online Security Threat

Malvertisements are attempts to inject malware and scareware into advertisements, leveraging the reach that advertising networks have. This blog entry examines...

Designing Effective Warnings
From BLOG@CACM

Designing Effective Warnings

Computer security warnings are something we all see everyday, but many people find them annoying and ignore them. What are better ways of designing warnings?

Designing Effective Interfaces For ­Usable Privacy and Security
From BLOG@CACM

Designing Effective Interfaces For ­Usable Privacy and Security

I often cringe when I hear highly technical engineers talk about people. I usually hear broad generalizations tossed about, like "people are lazy, that's why they...

Helping Younger People Protect Themselves from Security Attacks
From BLOG@CACM

Helping Younger People Protect Themselves from Security Attacks

One potentially disturbing trend that came out in a recent eCrime meeting is that younger people 18-24 years old seem to be more susceptible to phishing attacks...

Designing Effective Security Warnings
From BLOG@CACM

Designing Effective Security Warnings

How do we create effective security warnings that people don't just swat away? Here, I report on one line of research that examines this question.

Security Education Can Really Work (but Only If It's Done Right)
From BLOG@CACM

Security Education Can Really Work (but Only If It's Done Right)

Although many people in computer security think that user education is hopeless, security education can really work, but only if it's done right. I report on a...

Privacy As... Sharing More Information?
From BLOG@CACM

Privacy As... Sharing More Information?

When I first started working in the area of personal privacy I had what I would call a conventional view on privacy, which is how to minimize the flow of information...

Google Android Authentication
From BLOG@CACM

Google Android Authentication

I recently saw a Google Android phone at HotMobile 2009 and was intrigued by the drawing-based authentication mechanism built in. Basically, there's a 3x3 grid...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account