acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Terrifying Technologies
From Schneier on Security

Terrifying Technologies

I've written about the difference between risk perception and risk reality. I thought about that when reading this list of Americans' top technology fears: Cyberterrorism...

How Israel Regulates Encryption
From Schneier on Security

How Israel Regulates Encryption

Interesting essay about how Israel regulates encryption: ...the Israeli encryption control mechanisms operate without directly legislating any form of encryption...

Forced Authorization Attacks Against Chip-and-Pin Credit Card Terminals
From Schneier on Security

Forced Authorization Attacks Against Chip-and-Pin Credit Card Terminals

Clever: The way forced authorisation fraud works is that the retailer sets up the terminal for a transaction by inserting the customer's card and entering the amount...

Friday Squid Blogging: North Korean Squid Fisherman Found Dead in Boats
From Schneier on Security

Friday Squid Blogging: North Korean Squid Fisherman Found Dead in Boats

I don't know if you've been following the story of the boats full of corpses that have been found in Japanese waters: Over the past two months, at least 12 wooden...

BlackBerry Leaves Pakistan Rather Than Provide a Government Backdoor
From Schneier on Security

BlackBerry Leaves Pakistan Rather Than Provide a Government Backdoor

BlackBerry has chosen to shut down operations in Pakistan rather than provide the government with backdoor access to encrypted communications. Pakistan is a relatively...

The Moral Dimension of Cryptography
From Schneier on Security

The Moral Dimension of Cryptography

Phil Rogaway has written an excellent paper titled "The Moral Character of Cryptography Work." In it, he exhorts cryptographers to consider the morality of their...

Worldwide Cryptographic Products Survey: Edits and Additions Wanted
From Schneier on Security

Worldwide Cryptographic Products Survey: Edits and Additions Wanted

Back in September, I announced my intention to survey the world market of cryptographic products. The goal is to compile a list of both free and commercial encryption...

Security vs. Business Flexibility
From Schneier on Security

Security vs. Business Flexibility

This article demonstrates that security is less important than functionality. When asked about their preference if they needed to choose between IT security and...

Tracking Someone Using LifeLock
From Schneier on Security

Tracking Someone Using LifeLock

Someone opened a LifeLock account in his ex-wife's name, and used the service to track her bank accounts, credit cards, and other financial activities. The article...

A History of Privacy
From Schneier on Security

A History of Privacy

This New Yorker article traces the history of privacy from the mid 1800s to today: As a matter of historical analysis, the relationship between secrecy and privacy...

Cryptanalysis of Algebraic Eraser
From Schneier on Security

Cryptanalysis of Algebraic Eraser

Algebraic Eraser is a public-key key-agreement protocol that's patented and being pushed by a company for the Internet of Things, primarily because it is efficient...

Friday Squid Blogging: Squid Necklace
From Schneier on Security

Friday Squid Blogging: Squid Necklace

She's calling it an octopus, but it's a squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Data and Goliath in German
From Schneier on Security

Data and Goliath in German

The German edition of Data and Goliath has been published....

Defending against Actual IT Threats
From Schneier on Security

Defending against Actual IT Threats

Roger Grimes has written an interesting paper: "Implementing a Data-Driven Computer Security Defense." His thesis is that most organizations don't match their defenses...

NSA Lectures on Communications Security from 1973
From Schneier on Security

NSA Lectures on Communications Security from 1973

Newly declassified: "A History of U.S. Communications Security (Volumes I and II)," the David G. Boak Lectures, National Security Agency (NSA), 1973. (The document...

NSA Collected Americans' E-mails Even After it Stopped Collecting Americans' E-mails
From Schneier on Security

NSA Collected Americans' E-mails Even After it Stopped Collecting Americans' E-mails

In 2011, the Bush administration authorized -- almost certainly illegally -- the NSA to conduct bulk electronic surveillance on Americans: phone calls, e-mails,...

Policy Repercussions of the Paris Terrorist Attacks
From Schneier on Security

Policy Repercussions of the Paris Terrorist Attacks

In 2013, in the early days of the Snowden leaks, Harvard Law School professor and former Assistant Attorney General Jack Goldsmith reflected on the increase in...

Voter Surveillance
From Schneier on Security

Voter Surveillance

There hasn't been that much written about surveillance and big data being used to manipulate voters. In Data and Goliath, I wrote: Unique harms can arise from the...

Friday Squid Blogging: Squid Spawning in South Australian Waters
From Schneier on Security

Friday Squid Blogging: Squid Spawning in South Australian Waters

Divers are counting them: Squid gather and mate with as many partners as possible, then die, in an annual ritual off Rapid Head on the Fleurieu Peninsula, south...

Reputation in the Information Age
From Schneier on Security

Reputation in the Information Age

Reputation is a social mechanism by which we come to trust one another, in all aspects of our society. I see it as a security mechanism. The promise and threat...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account