acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Cell Phone Surveillance
From Schneier on Security

Cell Phone Surveillance

Good article on the different ways the police can eavesdrop on cell phone calls.

Decrypting a Secret Society's Documents from the 1740s
From Schneier on Security

Decrypting a Secret Society's Documents from the 1740s

Great story, both the cryptanalysis process and the Oculists.

Anonymous Claims it Sabotaged Rove Election Hacking
From Schneier on Security

Anonymous Claims it Sabotaged Rove Election Hacking

Can anyone make heads or tails of this story? (More links.) For my part, I'd like a little -- you know -- evidence. Remember that Ohio was not the deciding state...

E-Mail Security in the Wake of Petraeus
From Schneier on Security

E-Mail Security in the Wake of Petraeus

I've been reading lots of articles articles discussing how little e-mail and Internet privacy we actually have in the U.S. This is a good one to start with: The...

Security Theater in American Diplomatic Missions
From Schneier on Security

Security Theater in American Diplomatic Missions

I noticed this in an article about how increased security and a general risk aversion is harming US diplomatic missions: "Barbara Bodine, who was the U.S. ambassador...

Friday Squid Blogging: Vampire Squid
From Schneier on Security

Friday Squid Blogging: Vampire Squid

Vampire squid eats marine wastes (paper and video). As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered...

Jamming 4G Cell Networks
From Schneier on Security

Jamming 4G Cell Networks

It's easy.

Stealing VM Keys from the Hardware Cache
From Schneier on Security

Stealing VM Keys from the Hardware Cache

Research into one VM stealing crypto keys from another VM running on the same hardware. ABSTRACT: This paper details the construction of an access-driven side...

The Terrorist Risk of Food Trucks
From Schneier on Security

The Terrorist Risk of Food Trucks

This is idiotic: Public Intelligence recently posted a Powerpoint presentation from the NYC fire department (FDNY) discussing the unique safety issues mobile food...

Webmail as Dead Drop
From Schneier on Security

Webmail as Dead Drop

I noticed this amongst the details of the Petraeus scandal: Petraeus and Broadwell apparently used a trick, known to terrorists and teenagers alike, to conceal...

Keys to the Crown Jewels Stolen?
From Schneier on Security

Keys to the Crown Jewels Stolen?

At least, that's the story: The locks at the Tower of London, home to the Crown Jewels, had to be changed after a burglar broke in and stole keys. The intruder...

Free Online Cryptography Course
From Schneier on Security

Free Online Cryptography Course

Dan Boneh of Stanford University is offering a free online cryptography course. The course runs for six weeks, and has five to seven hours of coursework per week...

Fairy Wren Passwords
From Schneier on Security

Fairy Wren Passwords

Mother fairy wrens teach their children passwords while they're still in their eggs to tell them from cuckoo impostors: She kept 15 nests under constant audiotheir...

Encryption in Cloud Computing
From Schneier on Security

Encryption in Cloud Computing

This article makes the important argument that encryption -- where the user and not the cloud provider holds the keys -- is critical to protect cloud data. The...

Friday Squid Blogging:  Squid Ink as a Condiment
From Schneier on Security

Friday Squid Blogging: Squid Ink as a Condiment

Burger King introduces a black burger with ketchup that includes squid ink. Only in Japan, of course.

How To Tell if Your Hotel Guest Is a Terrorist
From Schneier on Security

How To Tell if Your Hotel Guest Is a Terrorist

From the Department of Homeland Security, a handy list of 19 suspicious behaviors that could indicate that a hotel guest is actually a terrorist. I myself have...

How Terrorist Groups Disband
From Schneier on Security

How Terrorist Groups Disband

Interesting research from RAND: Abstract: How do terrorist groups end? The evidence since 1968 indicates that terrorist groups rarely cease to exist as a result...

Gary McGraw on National Cybersecurity
From Schneier on Security

Gary McGraw on National Cybersecurity

Good essay, making the point that cyberattack and counterattack aren't very useful -- actual cyberdefense is what's wanted. Creating a cyber-rock is cheap. Buying...

Micromorts
From Schneier on Security

Micromorts

Here's a great concept: a micromort: Shopping for coffee you would not ask for 0.00025 tons (unless you were naturally irritating), you would ask for 250 grams...

New SSL Vulnerability
From Schneier on Security

New SSL Vulnerability

It's hard for me to get too worked up about this vulnerability: Many popular applications, HTTP(S) and WebSocket transport libraries, and SOAP and REST Web-services...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account