acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Friday Squid Blogging: Penguins Fight over Squid
From Schneier on Security

Friday Squid Blogging: Penguins Fight over Squid

Watch this video of gentoo penguins fighting over a large squid. This underwater brawl was captured on a video camera taped to the back of the second penguin, revealing...

GCHQ Holiday Puzzle
From Schneier on Security

GCHQ Holiday Puzzle

If you like puzzles, GCHQ has one for you. Just don't let it distract you from fighting the UK legislation giving the GCHQ new surveillance powers....

25th Anniversary of the Landmark Unix Security Book
From Schneier on Security

25th Anniversary of the Landmark Unix Security Book

Gene Spafford writes about the history of Practical Unix Security....

Catalog of Police Surveillance Equipment
From Schneier on Security

Catalog of Police Surveillance Equipment

The Intercept has "a secret, internal U.S. government catalogue of dozens of cellphone surveillance devices used by the military and by intelligence agencies."...

User Errors Often Compromise Encryption
From Schneier on Security

User Errors Often Compromise Encryption

This should come as no surprise: users often compromise their own security by making mistakes setting up and using their encryption apps. Paper: "On the Security...

DOS Attack Against Los Angeles Schools
From Schneier on Security

DOS Attack Against Los Angeles Schools

Yesterday, the city of Los Angeles closed all of its schools -- over 1,000 schools -- because of a bomb threat. It was a hoax. LA officials defended the move, with...

Attack Against DNS Root Servers
From Schneier on Security

Attack Against DNS Root Servers

Has anyone been following the attack against the DNS root servers two weeks ago? Details. I can't precisely explain why, but this feels like someone testing an...

"Security Theater" Sighting
From Schneier on Security

"Security Theater" Sighting

In a Schlock Mercenary comic....

Good Swatting Story
From Schneier on Security

Good Swatting Story

The New York Times Magazine has a good story about swatting, centering around a Canadian teenager who did it over a hundred times....

Friday Squid Blogging: Rare Octopus Squid Video from Hawaii
From Schneier on Security

Friday Squid Blogging: Rare Octopus Squid Video from Hawaii

Neat: While the Dana octopus squid may lack a squid's trademark trailing tentacles, it makes up for them in spectacular lighting equipment, with two of its muscular...

Resilient Systems News: End-of-Year Trends Webinar
From Schneier on Security

Resilient Systems News: End-of-Year Trends Webinar

I'll be participating in an end-of-year trends and predictions webinar on Thursday, December 17, at 1:00 PM EST. Join me here. In other news, Resilient has joined...

Hit-and-Run Driver Arrested Because Car Reported Accident
From Schneier on Security

Hit-and-Run Driver Arrested Because Car Reported Accident

A Florida woman drove away after an accident, but her car automatically reported it anyway. She was arrested....

How People Learn about Computer Security
From Schneier on Security

How People Learn about Computer Security

Interesting research: "Identifying patterns in informal sources of security information," by Emilee Rader and Rick Wash, Journal of Cybersecurity, 1 Dec 2015. Abstract...

Terrifying Technologies
From Schneier on Security

Terrifying Technologies

I've written about the difference between risk perception and risk reality. I thought about that when reading this list of Americans' top technology fears: Cyberterrorism...

How Israel Regulates Encryption
From Schneier on Security

How Israel Regulates Encryption

Interesting essay about how Israel regulates encryption: ...the Israeli encryption control mechanisms operate without directly legislating any form of encryption...

Forced Authorization Attacks Against Chip-and-Pin Credit Card Terminals
From Schneier on Security

Forced Authorization Attacks Against Chip-and-Pin Credit Card Terminals

Clever: The way forced authorisation fraud works is that the retailer sets up the terminal for a transaction by inserting the customer's card and entering the amount...

Friday Squid Blogging: North Korean Squid Fisherman Found Dead in Boats
From Schneier on Security

Friday Squid Blogging: North Korean Squid Fisherman Found Dead in Boats

I don't know if you've been following the story of the boats full of corpses that have been found in Japanese waters: Over the past two months, at least 12 wooden...

BlackBerry Leaves Pakistan Rather Than Provide a Government Backdoor
From Schneier on Security

BlackBerry Leaves Pakistan Rather Than Provide a Government Backdoor

BlackBerry has chosen to shut down operations in Pakistan rather than provide the government with backdoor access to encrypted communications. Pakistan is a relatively...

The Moral Dimension of Cryptography
From Schneier on Security

The Moral Dimension of Cryptography

Phil Rogaway has written an excellent paper titled "The Moral Character of Cryptography Work." In it, he exhorts cryptographers to consider the morality of their...

Worldwide Cryptographic Products Survey: Edits and Additions Wanted
From Schneier on Security

Worldwide Cryptographic Products Survey: Edits and Additions Wanted

Back in September, I announced my intention to survey the world market of cryptographic products. The goal is to compile a list of both free and commercial encryption...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account