acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Peter Swire on the USA FREEDOM Act
From Schneier on Security

Peter Swire on the USA FREEDOM Act

Peter Swire, law professor and one of the members of the President's review group on the NSA, writes about intelligence reform and the USA FREEDOM Act....

Encrypting Windows Hard Drives
From Schneier on Security

Encrypting Windows Hard Drives

Encrypting your Windows hard drives is trivially easy; choosing which program to use is annoyingly difficult. I still use Windows -- yes, I know, don't even start...

Eighth Movie-Plot Threat Contest Winner
From Schneier on Security

Eighth Movie-Plot Threat Contest Winner

On April 1, I announced the Eighth Movie-Plot Threat Contest: I want a movie-plot threat that shows the evils of encryption. (For those who don't know, a movie-plot...

Friday Squid Blogging: Dancing Zombie Squid
From Schneier on Security

Friday Squid Blogging: Dancing Zombie Squid

How dead squid is made to dance when soy sauce is poured on it. As usual, you can also use this squid post to talk about the security stories in the news that I...

Uh Oh -- Robots Are Getting Good with Samurai Swords
From Schneier on Security

Uh Oh -- Robots Are Getting Good with Samurai Swords

It's Iaido, not sword fighting, but still. Of course, the two didn't battle each other, but competed in Iaido tests like cutting mats and flowers in various cross...

The History of Internet Insecurity
From Schneier on Security

The History of Internet Insecurity

The Washington Post has a good two part story on the history of insecurity of the Internet....

Duqu 2.0
From Schneier on Security

Duqu 2.0

Kaspersky Labs has discovered and publicized details of a new nation-state surveillance malware system, called Duqu 2.0. It's being attributed to Israel. There's...

Security and Human Behavior (SHB 2015)
From Schneier on Security

Security and Human Behavior (SHB 2015)

Earlier this week, I was at the eighth Workshop on Security and Human Behavior. This is a small invitational gathering of people studying various aspects of the...

Reassessing Airport Security
From Schneier on Security

Reassessing Airport Security

News that the Transportation Security Administration missed a whopping 95% of guns and bombs in recent airport security "red team" tests was justifiably shocking...

Should Companies Do Most of Their Computing in the Cloud? (Part 3)
From Schneier on Security

Should Companies Do Most of Their Computing in the Cloud? (Part 3)

Cloud computing is the future of computing. Specialization and outsourcing make society more efficient and scalable, and computing isn't any different. But why...

Should Companies Do Most of Their Computing in the Cloud? (Part 2)
From Schneier on Security

Should Companies Do Most of Their Computing in the Cloud? (Part 2)

Let me start by describing two approaches to the cloud. Most of the students I meet at Harvard University live their lives in the cloud. Their e-mail, documents...

Should Companies Do Most of Their Computing in the Cloud? (Part 1)
From Schneier on Security

Should Companies Do Most of Their Computing in the Cloud? (Part 1)

Yes. No. Yes. Maybe. Yes. Okay, it's complicated. The economics of cloud computing are compelling. For companies, the lower operating costs, the lack of capital...

The Effects of Near Misses on Risk Decision-Making
From Schneier on Security

The Effects of Near Misses on Risk Decision-Making

This is interesting research: "How Near-Miss Events Amplify or Attenuate Risky Decision Making," Catherine H. Tinsley, Robin L. Dillon, and Matthew A. Cronin. In...

Surveillance Law and Surveillance Studies
From Schneier on Security

Surveillance Law and Surveillance Studies

Interesting paper by Julie Cohen: Abstract: The dialogue between law and Surveillance Studies has been complicated by a mutual misrecognition that is both theoretical...

Tracking People By Smart Phone Accelerometers
From Schneier on Security

Tracking People By Smart Phone Accelerometers

Interesting research: "We Can Track You If You Take the Metro: Tracking Metro Riders Using Accelerometers on Smartphones": Abstract: Motion sensors (e.g., accelerometers)...

Friday Squid Blogging: Giant Squid Lore
From Schneier on Security

Friday Squid Blogging: Giant Squid Lore

Legends of giant squid go back centuries: In his book "The Search for the Giant Squid" marine biologist Richard Ellis notes that "There is probably no apparition...

US Identifies and Destroys ISIS Headquarters Because of "Selfie"
From Schneier on Security

US Identifies and Destroys ISIS Headquarters Because of "Selfie"

The news media is buzzing about how the US military identified the location of an ISIS HQ because someone there took a photo and posted it. Quoting Air Force General...

NSA Running a Massive IDS on the Internet Backbone
From Schneier on Security

NSA Running a Massive IDS on the Internet Backbone

The latest story from the Snowden documents, co-published by The New York Times and ProPublica, shows that the NSA is operating a signature-based intrusion detection...

Yet Another New Biometric: Brainprints
From Schneier on Security

Yet Another New Biometric: Brainprints

New research: In "Brainprint," a newly published study in academic journal Neurocomputing, researchers from Binghamton University observed the brain signals of...

2015 EPIC Champions of Freedom Dinner
From Schneier on Security

2015 EPIC Champions of Freedom Dinner

Monday night, EPIC -- that's the Electronic Privacy Information Center -- had its annual Champions of Freedom Dinner. I tell you this for two reasons. One, I received...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account