acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Scams from the 1800s
From Schneier on Security

Scams from the 1800s

They feel quaint today: But in the spring of 1859, folks were concerned about another kind of hustle: A man who went by the name of A.V. Lamartine drifted from...

Friday Squid Blogging: Cooking with Squid Ink
From Schneier on Security

Friday Squid Blogging: Cooking with Squid Ink

Risotto nero and more. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Security Lessons from the Game of Werewolf
From Schneier on Security

Security Lessons from the Game of Werewolf

I can't believe I haven't posted this before....

Breaking Semantic Image CAPTCHAs
From Schneier on Security

Breaking Semantic Image CAPTCHAs

Interesting research: Suphannee Sivakorn, Iasonas Polakis and Angelos D. Keromytis, "I Am Robot: (Deep) Learning to Break Semantic Image CAPTCHAs": Abstract: Since...

Bypassing Phone Security through Social Engineering
From Schneier on Security

Bypassing Phone Security through Social Engineering

This works: Khan was arrested in mid-July 2015. Undercover police officers posing as company managers arrived at his workplace and asked to check his driver and...

IBM Officially Owns Resilient Systems
From Schneier on Security

IBM Officially Owns Resilient Systems

It's officially final; IBM has "completed the acquisition" of Resilient Systems, Inc. We are now "Resilient: an IBM Company." As I expected when I announced this...

CONIKS
From Schneier on Security

CONIKS

CONIKS is an new easy-to-use transparent key-management system: CONIKS is a key management system for end users capable of integration in end-to-end secure communication...

WhatsApp is Now End-to-End Encrypted
From Schneier on Security

WhatsApp is Now End-to-End Encrypted

WhatsApp is now end-to-end encrypted....

Data and Goliath Sale
From Schneier on Security

Data and Goliath Sale

I have a bunch of extra copies of my book Data and Goliath, and I am selling them at a discount. Details here....

Smart Essay on the Limitations of Anti-Terrorism Security
From Schneier on Security

Smart Essay on the Limitations of Anti-Terrorism Security

This is good: Threats constantly change, yet our political discourse suggests that our vulnerabilities are simply for lack of resources, commitment or competence...

Friday Squid Blogging: Composite Materials Based on Squid Beaks
From Schneier on Security

Friday Squid Blogging: Composite Materials Based on Squid Beaks

Squid-based research is yielding composites that are both strong and flexible. As usual, you can also use this squid post to talk about the security stories in...

Reddit's Warrant Canary Just Died
From Schneier on Security

Reddit's Warrant Canary Just Died

Reddit has received a National Security Letter. I have long discounted warrant canaries. A gag order is serious, and this sort of high-school trick won't fool judges...

Hacking Elections in Latin America
From Schneier on Security

Hacking Elections in Latin America

Long and interesting article about a fixer who hacked multiple elections in Latin America. This isn't election hacking as in manipulate the voting machines or the...

ISIS Encryption Opsec
From Schneier on Security

ISIS Encryption Opsec

Tidbits from the New York Times: The final phase of Mr. Hame's training took place at an Internet cafe in Raqqa, where an Islamic State computer specialist handed...

Lawful Hacking and Continuing Vulnerabilities
From Schneier on Security

Lawful Hacking and Continuing Vulnerabilities

The FBI's legal battle with Apple is over, but the way it ended may not be good news for anyone. Federal agents had been seeking to compel Apple to break the security...

Mass Surveillance Silences Minority Opinions
From Schneier on Security

Mass Surveillance Silences Minority Opinions

Research paper: Elizabeth Stoycheff, "Under Surveillance: Examining Facebook's Spiral of Silence Effects in the Wake of NSA Internet Monitoring": Abstract: Since...

A 1976 Congressional Report on Surveillance
From Schneier on Security

A 1976 Congressional Report on Surveillance

Here's a 1,300-page Congressional report on "surveillance technology" from 1976....

Power on the Internet
From Schneier on Security

Power on the Internet

Interesting paper: Yochai Benkler, "Degrees of Freedom, Dimensions of Power," Daedelus, winter 2016: Abstract: The original Internet design combined technical,...

Friday Squid Blogging: President Squid
From Schneier on Security

Friday Squid Blogging: President Squid

New children's book....

Memphis Airport Inadvertently Gets Security Right
From Schneier on Security

Memphis Airport Inadvertently Gets Security Right

A local newspaper recently tested airport security at Memphis Airport: Our crew sat for 30 minutes in the passenger drop-off area Tuesday without a word from anyone...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account