acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Friday Squid Blogging: Squid Hoodie
From Schneier on Security

Friday Squid Blogging: Squid Hoodie

This is neat. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

The No-Fly List and Due Process
From Schneier on Security

The No-Fly List and Due Process

The Congressional Research Service has released a report on the no-fly list and current litigation that it violates due process....

How Many Vulnerabilities Are there in Software?
From Schneier on Security

How Many Vulnerabilities Are there in Software?

Dan Geer proposes some techniques for answering this question....

Metal Detectors at Sports Stadiums
From Schneier on Security

Metal Detectors at Sports Stadiums

Fans attending Major League Baseball games are being greeted in a new way this year: with metal detectors at the ballparks. Touted as a counterterrorism measure...

John Oliver Interviews Edward Snowden
From Schneier on Security

John Oliver Interviews Edward Snowden

Wow, what an amazing segment and interview....

Two Thoughtful Essays on the Future of Privacy
From Schneier on Security

Two Thoughtful Essays on the Future of Privacy

Paul Krugman argues that we'll give up our privacy because we want to emulate the rich, who are surrounded by servants who know everything about them: Consider...

China's Great Cannon
From Schneier on Security

China's Great Cannon

Citizen Lab has issued a report on China's "Great Cannon" attack tool, used in the recent DDoS attack against GitHub. We show that, while the attack infrastructure...

Alternatives to the FBI's Manufacturing of Terrorists
From Schneier on Security

Alternatives to the FBI's Manufacturing of Terrorists

John Mueller suggests an alternative to the FBI's practice of encouraging terrorists and then arresting them for something they would have never have planned on...

Pepper-Spray Drones
From Schneier on Security

Pepper-Spray Drones

India has purchased pepper-spray drones....

Attacking Researchers Who Expose Voting Vulnerabilities
From Schneier on Security

Attacking Researchers Who Expose Voting Vulnerabilities

Researchers found voting-system flaws in New South Wales, and were attacked by voting officials and the company that made the machines....

Lone-Wolf Terrorism
From Schneier on Security

Lone-Wolf Terrorism

The Southern Poverty Law Center warns of the rise of lone-wolf terrorism. From a security perspective, lone wolves are much harder to prevent because there is no...

Cell Phone Opsec
From Schneier on Security

Cell Phone Opsec

Here's an article on making secret phone calls with cell phones. His step-by-step instructions for making a clandestine phone call are as follows: Analyze your...

Bluetooth Doorlock
From Schneier on Security

Bluetooth Doorlock

Neat, but I'll bet it can be hacked....

Friday Squid Blogging: Giant Squid Video
From Schneier on Security

Friday Squid Blogging: Giant Squid Video

Giant squid caught on video. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Friday Squid Blogging: The Longfin Inshore Squid Regularly Rewrites Its Own DNA
From Schneier on Security

Friday Squid Blogging: The Longfin Inshore Squid Regularly Rewrites Its Own DNA

Wow. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

TrueCrypt Security Audit Completed
From Schneier on Security

TrueCrypt Security Audit Completed

The security audit of the TrueCrypt code has been completed (see here for the first phase of the audit), and the results are good. Some issues were found, but nothing...

Real-Life Remailers in the Warsaw Pact Nations
From Schneier on Security

Real-Life Remailers in the Warsaw Pact Nations

Interesting story....

Ugly Mail: Gmail Extension to Expose E-mail Tracking
From Schneier on Security

Ugly Mail: Gmail Extension to Expose E-mail Tracking

Nice idea, but I would like it to work for other browsers and other e-mail programs....

The Eighth Movie-Plot Threat Contest
From Schneier on Security

The Eighth Movie-Plot Threat Contest

It's April 1, and time for another Movie-Plot Threat Contest. This year, the theme is Crypto Wars II. Strong encryption is evil, because it prevents the police...

Survey of Americans' Privacy Habits Post-Snowden
From Schneier on Security

Survey of Americans' Privacy Habits Post-Snowden

Pew Research has a new survey on Americans' privacy habits in a post-Snowden world. The 87% of those who had heard at least something about the programs were asked...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account