acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Is Antivirus Dead?
From Schneier on Security

Is Antivirus Dead?

Symantec declared anti-virus dead, and Brian Krebs writes a good response. He's right: antivirus won't protect you from the ever-increasing percentage of malware...

Seventh Movie-Plot Threat Contest Semifinalists
From Schneier on Security

Seventh Movie-Plot Threat Contest Semifinalists

On April 1, I announced the Seventh Movie Plot Threat Contest: The NSA has won, but how did it do it? How did it use its ability to conduct ubiquitous surveillance...

Espionage vs. Surveillance
From Schneier on Security

Espionage vs. Surveillance

According to NSA documents published in Glenn Greenwald's new book No Place to Hide, we now know that the NSA spies on embassies and missions all over the world...

New Al Qaeda Encryption Software
From Schneier on Security

New Al Qaeda Encryption Software

The Web intelligence company Recorded Future is reporting -- picked up by the Wall Street Journal -- that al Qaeda is using new encryption software in the wake...

Computer Forensics in Fiction
From Schneier on Security

Computer Forensics in Fiction

New television show -- CSI: Cyber. I hope they have some good technical advisers, but I doubt they do....

New NSA Snowden Documents
From Schneier on Security

New NSA Snowden Documents

Glenn Greenwald's book, No Place to Hide, has been published today. There are about 100 pages of NSA documents on the book's website. I haven't gone through them...

Steganography in Tweets
From Schneier on Security

Steganography in Tweets

Clever, but make sure to heed the caveats in the final two paragraphs....

Internet Subversion
From Schneier on Security

Internet Subversion

In addition to turning the Internet into a worldwide surveillance platform, the NSA has surreptitiously weakened the products, protocols, and standards we all use...

Friday Squid Blogging: The Evolutionary Purpose of Pain
From Schneier on Security

Friday Squid Blogging: The Evolutionary Purpose of Pain

A new study shows that Doryteuthis pealei in pain -- or whatever passes for pain in that species -- has heightened sensory sensitivity and heightened reactions....

Putin Requires Russian Bloggers to Register with the Government
From Schneier on Security

Putin Requires Russian Bloggers to Register with the Government

This is not good news. Widely known as the "bloggers law," the new Russian measure specifies that any site with more than 3,000 visitors daily will be considered...

Retelling of Stories Increases Bias
From Schneier on Security

Retelling of Stories Increases Bias

Interesting experiment shows that the retelling of stories increases conflict and bias. For their study, which featured 196 undergraduates, the researchers created...

Correspondence Between the NSA and Google Leaked
From Schneier on Security

Correspondence Between the NSA and Google Leaked

Al Jazeera is reporting on leaked emails (not leaked by Snowden, but by someone else) detailing close ties between the NSA and Google. There are no smoking guns...

Fearing Google
From Schneier on Security

Fearing Google

Mathias Dopfner writes an open letter explaining why he fears Google: We know of no alternative which could offer even partially comparable technological prerequisites...

The Economics of Video Game Cheating
From Schneier on Security

The Economics of Video Game Cheating

Interesting article on the business of selling enhancements that allow you to cheat in online video games....

Friday Squid Blogging: How Flying Squid Fly
From Schneier on Security

Friday Squid Blogging: How Flying Squid Fly

Someone has finally proven how: How do these squid go from swimming to flying? Four phases of flight are described in the research: launching, jetting, gliding...

Unusual Electronic Voting Machine Threat Model
From Schneier on Security

Unusual Electronic Voting Machine Threat Model

Rats have destroyed dozens of electronic voting machines by eating the cables. It would have been a better story if the rats had zeroed out the machines after the...

Analysis of the FBI's Failure to Stop the Boston Marathon Bombings
From Schneier on Security

Analysis of the FBI's Failure to Stop the Boston Marathon Bombings

Detailed response and analysis of the inspectors general report on the Boston Marathon bombings: Two opposite mistakes in an after-the-fact review of a terrorist...

Really Weird Keith Alexander Interview
From Schneier on Security

Really Weird Keith Alexander Interview

Comedian John Oliver interviewed now-retired NSA director General Keith Alexander. It's truly weird....

The Federal Reserve System's Cyberdefense Force
From Schneier on Security

The Federal Reserve System's Cyberdefense Force

Interesting article on the cybersecurity branch of the Federal Reserve System....

Tracking People from Smartphone Accelerometers
From Schneier on Security

Tracking People from Smartphone Accelerometers

It's been long known that individual analog devices have their own fingerprints. Decades ago, individual radio transmitters were identifiable and trackable. Now...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account