acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Friday Squid Blogging: Woman's Mouth Inseminated by Cooked Squid
From Schneier on Security

Friday Squid Blogging: Woman's Mouth Inseminated by Cooked Squid

This story is so freaky I'm not even sure I want to post it. But if I don't, you'll all send me the links. As usual, you can also use this squid post to talk...

FireDogLake Book Salon for <i>Liars and Outliers</i>
From Schneier on Security

FireDogLake Book Salon for Liars and Outliers

On Sunday, I will be participating in a public discussion about my new book on the FireDogLake website. James Fallows will be the moderator, and I will be answering...

Rare Rational Comment on al Qaeda's Capabilities
From Schneier on Security

Rare Rational Comment on al Qaeda's Capabilities

From "CNN national security analyst" Peter Bergen: Few Americans harbor irrational fears about being killed by a lightning bolt. Abu Yahya al-Libi's death on Monday...

Cheating in Online Classes
From Schneier on Security

Cheating in Online Classes

Interesting article: In the case of that student, the professor in the course had tried to prevent cheating by using a testing system that pulled questions at...

Cyberwar Treaties
From Schneier on Security

Cyberwar Treaties

We're in the early years of a cyberwar arms race. It's expensive, it's destabilizing, and it threatens the very fabric of the Internet we use every day. Cyberwar...

Teaching the Security Mindset
From Schneier on Security

Teaching the Security Mindset

In 2008 I wrote about the security mindset and how difficult it is to teach. Two professors teaching a cyberwarfare class gave an exam where they expected their...

High-Quality Fake IDs from China
From Schneier on Security

High-Quality Fake IDs from China

USA Today article: Most troubling to authorities is the sophistication of the forgeries: Digital holograms are replicated, PVC plastic identical to that found...

Israel Demanding Passwords at the Border
From Schneier on Security

Israel Demanding Passwords at the Border

There have been a bunch of stories about employers demanding passwords to social networking sites, like Facebook, from prospective employees, and several states...

Changing Surveillance Techniques for Changed Communications Technologies
From Schneier on Security

Changing Surveillance Techniques for Changed Communications Technologies

New paper by Peter P. Swire -- "From Real-Time Intercepts to Stored Records: Why Encryption Drives the Government to Seek Access to the Cloud": Abstract: This...

Friday Squid Blogging: Baby Opalescent Squid
From Schneier on Security

Friday Squid Blogging: Baby Opalescent Squid

Baby squid larvae are transparent after they hatch, so you can see the chromataphores (color control mechanisms) developing after a few days. As usual, you can...

The Catastrophic Consequences of 9/11
From Schneier on Security

The Catastrophic Consequences of 9/11

This is an interesting essay -- it claims to be the first in a series -- that looks at the rise of "homeland security" as a catastrophic consequence of the 9/11...

Homeland Security as Security Theater Metaphor
From Schneier on Security

Homeland Security as Security Theater Metaphor

Look at the last sentence in this article on hotel cleanliness: "I relate this to homeland security. We are not any safer, but many people believe that we are,"...

Ghostery
From Schneier on Security

Ghostery

Ghostery is a Firefox plug-in that tracks who is tracking your browsing habits in cyberspace. Here's a TED talk by Gary Kovacs, the CEO of Mozilla Corp., on it...

Security and Human Behavior (SHB 2012)
From Schneier on Security

Security and Human Behavior (SHB 2012)

I'm at the Fifth Interdisciplinary Workshop on Security and Human Behavior, SHB 2012. Google is hosting this year, at its offices in lower Manhattan. SHB is an...

Interesting Article on Libyan Internet Intelligence Gathering
From Schneier on Security

Interesting Article on Libyan Internet Intelligence Gathering

This is worth reading, for the insights it provides on how a country goes about monitoring its citizens in the information age: a combination of targeted attacks...

The Unreliability of Eyewitness Testimony
From Schneier on Security

The Unreliability of Eyewitness Testimony

Interesting article: The reliability of witness testimony is a vastly complex subject, but legal scholars and forensic psychologists say it's possible to extract...

Flame
From Schneier on Security

Flame

Flame seems to be another military-grade cyber-weapon, this one optimized for espionage. The worm is at least two years old, and is mainly confined to computers...

Friday Squid Blogging: Mimicking Squid Camouflage
From Schneier on Security

Friday Squid Blogging: Mimicking Squid Camouflage

Interesting: Cephalopods - squid, cuttlefish and octopuses - change colour by using tiny muscles in their skins to stretch out small sacs of black colouration....

Obama's Role in Stuxnet and Iranian Cyberattacks
From Schneier on Security

Obama's Role in Stuxnet and Iranian Cyberattacks

Really interesting article.

The Vulnerabilities Market and the Future of Security
From Schneier on Security

The Vulnerabilities Market and the Future of Security

Recently, there have been several articles about the new market in zero-day exploits: new and unpatched computer vulnerabilities. It's not just software companies...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account