acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Friday Squid Blogging: Barramundi with Squid Ink Risotto
From Schneier on Security

Friday Squid Blogging: Barramundi with Squid Ink Risotto

Squid ink risotto is a good accompaniment for any mild fish. As usual, you can also use this squid post to talk about the security stories in the news that I haven't...

Cybersecurity Issues for the Next Administration
From Schneier on Security

Cybersecurity Issues for the Next Administration

On today's Internet, too much power is concentrated in too few hands. In the early days of the Internet, individuals were empowered. Now governments and corporations...

The Psychology of Bad Password Habits
From Schneier on Security

The Psychology of Bad Password Habits

Interesting data and analysis....

Free Online Cybersecurity Economics Course
From Schneier on Security

Free Online Cybersecurity Economics Course

TU Delft is running a free online class in cybersecurity economics....

The Psychological Impact of Doing Classified Intelligence Work
From Schneier on Security

The Psychological Impact of Doing Classified Intelligence Work

Richard Thieme gave a talk on the psychological impact of doing classified intelligence work. Summary here...

Indiana's Voter Registration Data Is Frighteningly Insecure
From Schneier on Security

Indiana's Voter Registration Data Is Frighteningly Insecure

You can edit anyone's information you want: The question, boiled down, was haunting: Want to see how easy it would be to get into someone's voter registration and...

Murder Is a Relatively Recent Evolutionary Strategy
From Schneier on Security

Murder Is a Relatively Recent Evolutionary Strategy

Interesting research in Nature. The article is behind a paywall, but here are five summaries of the research....

Security Economics of the Internet of Things
From Schneier on Security

Security Economics of the Internet of Things

Brian Krebs is a popular reporter on the cybersecurity beat. He regularly exposes cybercriminals and their tactics, and consequently is regularly a target of their...

Friday Squid Blogging: Squid Are Colorblind
From Schneier on Security

Friday Squid Blogging: Squid Are Colorblind

All cephalopods are colorblind. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

NSA Contractor Arrested for Stealing Classified Information
From Schneier on Security

NSA Contractor Arrested for Stealing Classified Information

The NSA has another contractor who stole classified documents. It's a weird story: "But more than a month later, the authorities cannot say with certainty whether...

Yahoo Scanned Everyone's E-mails for the NSA
From Schneier on Security

Yahoo Scanned Everyone's E-mails for the NSA

News here and here. Other companies have been quick to deny that they did the same thing, but I generally don't believe those carefully worded statements about...

Quantum Tokens for Digital Signatures
From Schneier on Security

Quantum Tokens for Digital Signatures

This paper wins "best abstract" award: "Quantum Tokens for Digital Signatures," by Shalev Ben David and Or Sattath: Abstract: The fisherman caught a quantum fish...

Credit Cards with Changing CVVs
From Schneier on Security

Credit Cards with Changing CVVs

There's a new French credit card where the CVV code changes every hour....

Is WhatsApp Hacked?
From Schneier on Security

Is WhatsApp Hacked?

Forbes is reporting that the Israeli cyberweapons arms manufacturer Wintego has a man-in-the-middle exploit against WhatsApp. It's a weird story. I'm not sure how...

US and China in Cyberspace
From Schneier on Security

US and China in Cyberspace

This article on US/China cooperation and competition in cyberspace is an interesting lens through which to examine security policy....

The Culture of Cybersecurity
From Schneier on Security

The Culture of Cybersecurity

Interesting survey of the cybersecurity culture in Norway. 96% of all Norwegian are online, more than 90% embrace new technology, and 6 of 10 feel capable of judging...

Security Design: Stop Trying to Fix the User
From Schneier on Security

Security Design: Stop Trying to Fix the User

Every few years, a researcher replicates a security study by littering USB sticks around an organization's grounds and waiting to see how many people pick them...

Friday Squid Blogging: Cannibal Squid
From Schneier on Security

Friday Squid Blogging: Cannibal Squid

The Gonatus squid eats its own kind. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

The Hacking of Yahoo
From Schneier on Security

The Hacking of Yahoo

Last week, Yahoo! announced that it was hacked pretty massively in 2014. Over half a billion usernames and passwords were affected, making this the largest data...

The Cost of Cyberattacks Is Less than You Might Think
From Schneier on Security

The Cost of Cyberattacks Is Less than You Might Think

Interesting research from Sasha Romanosky at RAND: Abstract: In 2013, the US President signed an executive order designed to help secure the nation's critical infrastructure...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account