acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

The Obsolescence of Submarines
From Schneier on Security

The Obsolescence of Submarines

Interesting article on the submarine arms race between remaining hidden and detection. It seems that it is much more expensive for a submarine to hide than it is...

IRS Encourages Poor Cryptography
From Schneier on Security

IRS Encourages Poor Cryptography

I'm not sure what to make of this, or even what it means. The IRS has a standard called IDES: International Data Exchange Service: "The International Data Exchange...

The Equation Group's Sophisticated Hacking and Exploitation Tools
From Schneier on Security

The Equation Group's Sophisticated Hacking and Exploitation Tools

This week, Kaspersky Labs published detailed information on what it calls the Equation Group -- almost certainly the NSA -- and its abilities to embed spyware deep...

Co3 Systems Changes Its Name to Resilient Systems
From Schneier on Security

Co3 Systems Changes Its Name to Resilient Systems

Today my company, Co3 Systems, is changing its name to Resilient Systems. The new name better reflects who we are and what we do. Plus, the old name was kind of...

Ford Proud that "Mustang" Is a Common Password
From Schneier on Security

Ford Proud that "Mustang" Is a Common Password

This is what happens when a PR person gets hold of information he really doesn't understand. "Mustang" is the 16th most common password on the Internet according...

New Book: Data and Goliath
From Schneier on Security

New Book: Data and Goliath

After a year of talking about it, my new book is finally published. This is the copy from the inside front flap: You are under surveillance right now. Your cell...

Friday Squid Blogging: Tentacle Utensils
From Schneier on Security

Friday Squid Blogging: Tentacle Utensils

Neat. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Cryptography for Kids
From Schneier on Security

Cryptography for Kids

Interesting National Science Foundation award: In the proposed "CryptoClub" afterschool program, middle-grade students will explore cryptography while applying...

Samsung Television Spies on Viewers
From Schneier on Security

Samsung Television Spies on Viewers

Earlier this week, we learned that Samsung televisions are eavesdropping on their owners. If you have one of their Internet-connected smart TVs, you can turn on...

Programming No-Fly Zones into Drones
From Schneier on Security

Programming No-Fly Zones into Drones

DJI is programming no-fly zones into its drone software. Here's how it'll work. The update will add a list of GPS coordinates to the drone's computer that tells...

Electronic Surveillance Failures Leading up to the 2008 Mumbai Terrorist Attacks
From Schneier on Security

Electronic Surveillance Failures Leading up to the 2008 Mumbai Terrorist Attacks

Long New York Times article based on "former American and Indian officials and classified documents disclosed by Edward J. Snowden" outlining the intelligence failures...

Understanding NSA Malware
From Schneier on Security

Understanding NSA Malware

Here are two essays trying to understand NSA malware and how it works, in light of the enormous number of documents released by Speigel recently....

National Academies Report on Bulk Intelligence Collection
From Schneier on Security

National Academies Report on Bulk Intelligence Collection

In January, the National Academies of Science (NAS) released a report on the bulk collection of signals intelligence. Basically, a year previously President Obama...

Friday Squid Blogging: How to Fish for Squid
From Schneier on Security

Friday Squid Blogging: How to Fish for Squid

The Washington Department of Fish and Wildlife explains how to fish for squid. As usual, you can also use this squid post to talk about the security stories in...

NSA Using Hacker Research and Results
From Schneier on Security

NSA Using Hacker Research and Results

In the latest article based on the Snowden documents, the Intercept is reporting that the NSA and GCHQ are piggy-backing on the work of hackers: In some cases,...

GPG Financial Difficulties
From Schneier on Security

GPG Financial Difficulties

Werner Koch, who has been maintaining the GPG email encryption program since 1997, is going broke and considering quitting. Updates to the article say that, because...

Tracking Bitcoin Scams
From Schneier on Security

Tracking Bitcoin Scams

Interesting paper: "There's No Free Lunch, Even Using Bitcoin: Tracking the Popularity and Profits of Virtual Currency Scams," by Marie Vasek and Tyler Moore. Abstract...

Obama Says Terrorism Is Not an Existential Threat
From Schneier on Security

Obama Says Terrorism Is Not an Existential Threat

In an interview this week, President Obama said that terrorism does not pose an existential threat: What I do insist on is that we maintain a proper perspective...

Texas School Overreaction
From Schneier on Security

Texas School Overreaction

Seems that a Texas school has suspended a 9-year-old for threatening another student with a replica One Ring. (Yes, that One Ring.) I've written about this sort...

Hiding a Morse Code Message in a Pop Song
From Schneier on Security

Hiding a Morse Code Message in a Pop Song

In Colombia: The team began experimenting with Morse code using various percussion instruments and a keyboard. They learned that operators skilled in Morse code...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account