acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Another Salvo in the Second Crypto War (of Words)
From Schneier on Security

Another Salvo in the Second Crypto War (of Words)

Prosecutors from New York, London, Paris, and Madrid wrote an op-ed in yesterday's New York Times in favor of backdoors in cell phone encryption. There are a number...

Intimidating Military Personnel by Targeting Their Families
From Schneier on Security

Intimidating Military Personnel by Targeting Their Families

This FBI alert is interesting: (U//FOUO) In May 2015, the wife of a US military member was approached in front of her home by two Middle-Eastern males. The men...

Incenting Drug Dealers to Snitch on Each Other
From Schneier on Security

Incenting Drug Dealers to Snitch on Each Other

Local police are trying to convince drug dealers to turn each other in by pointing out that it reduces competition. It's a comical tactic with serious results:...

Detecting Betrayal in Diplomacy Games
From Schneier on Security

Detecting Betrayal in Diplomacy Games

Interesting research detecting betrayal in the game of Diplomacy by analyzing interplayer messages. One harbinger was a shift in politeness. Players who were excessively...

Friday Squid Blogging: Divers Find Squid Eggs
From Schneier on Security

Friday Squid Blogging: Divers Find Squid Eggs

Divers discover a large mass of Ommastrephes bartramii eggs: Earlier this month, a team of divers swimming off the coast of Turkey discovered something unexpected...

Meerkats that Look like Bruce Schneier
From Schneier on Security

Meerkats that Look like Bruce Schneier

Yet another example of my surreal life. (No, I have no idea who did this.)...

The Outing of ECHELON
From Schneier on Security

The Outing of ECHELON

Before Edward Snowden told us so much about NSA surveillance, before Mark Klein told us a little, even before 9/11, Duncan Campbell broke the story of ECHELON....

Security for the Rest of Us
From Schneier on Security

Security for the Rest of Us

Good fictional account of an average computer user and how people understand and view security. Related: "Real World Use Cases for High-Risk Users."...

Nicholas Weaver on iPhone Security
From Schneier on Security

Nicholas Weaver on iPhone Security

Excellent essay: Yes, an iPhone configured with a proper password has enough protection that, turned off, I'd be willing to hand mine over to the DGSE, NSA, or...

Face Recognition by Thermal Imaging
From Schneier on Security

Face Recognition by Thermal Imaging

New research can identify a person by reading their thermal signature in complete darkness and then matching it with ordinary photographs. Research paper: Abstract...

Shooting Down Drones
From Schneier on Security

Shooting Down Drones

A Kentucky man shot down a drone that was hovering in his backyard: "It was just right there," he told Ars. "It was hovering, I would never have shot it if it was...

Vulnerabilities in Brink's Smart Safe
From Schneier on Security

Vulnerabilities in Brink's Smart Safe

Brink's sells an Internet-enabled smart safe called the CompuSafe Galileo. Despite being sold as a more secure safe, it's wildly insecure: Vulnerabilities found...

Help with Mailing List Hosting
From Schneier on Security

Help with Mailing List Hosting

I could use some help finding a host for my monthly newsletter, Crypto-Gram. My old setup just wasn't reliable enough. I had a move planned, but that fell through...

John Mueller on the Overblown ISIS Threat
From Schneier on Security

John Mueller on the Overblown ISIS Threat

John Mueller has a good essay on how the ISIS threat is overblown....

Friday Squid Blogging: Russian Sailors Video Colossal Squid
From Schneier on Security

Friday Squid Blogging: Russian Sailors Video Colossal Squid

It tried to steal their catch. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Schneier Speaking Schedule
From Schneier on Security

Schneier Speaking Schedule

I'm speaking at an Infoedge event at Bali Hai Golf Club in Las Vegas, at 5 PM on August 5, 2015. I'm speaking at DefCon 23 on Friday, August 7, 2015. I'm speaking...

HAMMERTOSS: New Russian Malware
From Schneier on Security

HAMMERTOSS: New Russian Malware

Fireeye has a detailed report of a sophisticated piece of Russian malware: HAMMERTOSS. It uses some clever techniques to hide: The Hammertoss backdoor malware looks...

Back Doors Won't Solve Comey's Going Dark Problem
From Schneier on Security

Back Doors Won't Solve Comey's Going Dark Problem

At the Aspen Security Forum two weeks ago, James Comey (and others) explicitly talked about the "going dark" problem, describing the specific scenario they are...

Comparing the Security Practices of Experts and Non-Experts
From Schneier on Security

Comparing the Security Practices of Experts and Non-Experts

New paper: "'...no one can hack my mind': Comparing Expert and Non-Expert Security Practices," by Iulia Ion, Rob Reeder, and Sunny Consolvo. Abstract: The state...

The NSA, Metadata, and the Failure of Stopping 9/11
From Schneier on Security

The NSA, Metadata, and the Failure of Stopping 9/11

It's common wisdom that the NSA was unable to intercept phone calls from Khalid al-Mihdhar in San Diego to Bin Ladin in Yemen because of legal restrictions. This...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account