acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

People Who Need to Pee Are Better at Lying
From Schneier on Security

People Who Need to Pee Are Better at Lying

No, really. Abstract: The Inhibitory-Spillover-Effect (ISE) on a deception task was investigated. The ISE occurs when performance in one self-control task facilitates...

Living in a Code Yellow World
From Schneier on Security

Living in a Code Yellow World

In the 1980s, handgun expert Jeff Cooper invented something called the Color Code to describe what he called the "combat mind-set." Here is his summary: In White...

Hacking the Game Show "Press Your Luck"
From Schneier on Security

Hacking the Game Show "Press Your Luck"

Fascinating story about a man who figured out how to hack the game show "Press Your Luck" in 1984....

Buying an Online Reputation
From Schneier on Security

Buying an Online Reputation

The story of a reporter who set up a fake business and then bought Facebook fans, Twitter followers, and online reviews. It was surprisingly easy and cheap....

Bringing Frozen Liquids through Airport Security
From Schneier on Security

Bringing Frozen Liquids through Airport Security

Gizmodo reports that UK airport security confiscates frozen liquids: "He told me that it wasn't allowed so I asked under what grounds, given it is not a liquid....

SYNful Knock Attack Against Cisco Routers
From Schneier on Security

SYNful Knock Attack Against Cisco Routers

FireEye is reporting the discovery of persistent malware that compromises Cisco routers: While this attack could be possible on any router technology, in this case...

History of Hacktivism
From Schneier on Security

History of Hacktivism

Nice article by Dorothy Denning. Hacktivism emerged in the late 1980s at a time when hacking for fun and profit were becoming noticeable threats. Initially it took...

Friday Squid Blogging; Giant Squid Sculpture at Burning Man
From Schneier on Security

Friday Squid Blogging; Giant Squid Sculpture at Burning Man

It looks impressive, maybe 20-30 feet long: "I think this might be the coolest thing I have ever built," said Barry Crawford about his giant, metal squid that was...

Drone Speedboat
From Schneier on Security

Drone Speedboat

It's a thing....

Smart Watch that Monitors Typing
From Schneier on Security

Smart Watch that Monitors Typing

Here's a watch that monitors the movements of your hand and can guess what you're typing. Using the watch's built-in motion sensors, more specifically data from...

Two Security Companies Battling It Out over Disclosures
From Schneier on Security

Two Security Companies Battling It Out over Disclosures

Okay, this is weird. FireEye has gone to court to prevent ERNW from disclosing vulnerabilities in FireEye products. FireEye should know better. Here's FireEye's...

Self-Destructing Computer Chip
From Schneier on Security

Self-Destructing Computer Chip

The chip is built on glass: Shattering the glass is straightforward. When the proper circuit is toggled, a small resistor within the substrate heats up until the...

Anonymous Browsing at the Library
From Schneier on Security

Anonymous Browsing at the Library

A rural New Hampshire library decided to install Tor on their computers and allow anonymous Internet browsing. The Department of Homeland pressured them to stop...

Child Arrested Because Adults Are Stupid
From Schneier on Security

Child Arrested Because Adults Are Stupid

A Texas 9th-grader makes an electronic clock and brings it to school. Teachers immediately become stupid and call the police: The bell rang at least twice, he said...

Obama and the Security of the Waldorf Astoria Hotel
From Schneier on Security

Obama and the Security of the Waldorf Astoria Hotel

President Obama won't stay at the Waldorf Astoria Hotel in New York because of security concerns. The hotel "was bought last year by Chinese investors with deep...

Hacking Team, Computer Vulnerabilities, and the NSA
From Schneier on Security

Hacking Team, Computer Vulnerabilities, and the NSA

When the National Security Administration (NSA) -- or any government agency -- discovers a vulnerability in a popular computer system, should it disclose it or...

Security Cartoon
From Schneier on Security

Security Cartoon

"Security vs. privacy."...

Programming Errors Weaken bcrypt Hashes of Ashley Madison Passwords
From Schneier on Security

Programming Errors Weaken bcrypt Hashes of Ashley Madison Passwords

Ashley Madison encrypted users' passwords using the bcrypt function. It's a secure password-encryption function, but two implemention programming mistakes allows...

Friday Squid Blogging: The Chemistry of Squid Camouflage
From Schneier on Security

Friday Squid Blogging: The Chemistry of Squid Camouflage

Interesting research. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Wanted: Cryptography Products for Worldwide Survey
From Schneier on Security

Wanted: Cryptography Products for Worldwide Survey

In 1999, Lance Hoffman, David Balenson, and others published a survey of non-US cryptographic products. The point of the survey was to illustrate that there was...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account