acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

1921 Book on Profiling
From Schneier on Security

1921 Book on Profiling

Here's a book from 1921 on how to profile people.

Technology is Making Life Harder for Spies
From Schneier on Security

Technology is Making Life Harder for Spies

An article from The Economist makes a point that I have been thinking about for a while: the modern technology makes life harder for spies, not easier. It used...

Friday Squid Blogging: Squidbillies
From Schneier on Security

Friday Squid Blogging: Squidbillies

Where do these TV shows come from? Follows the adventures of the Cuylers, an impoverished and dysfunctional family of anthropomorphic, air-breathing, redneck squids...

<i>The Washington Post</i> on the U.S. Intelligence Industry
From Schneier on Security

The Washington Post on the U.S. Intelligence Industry

The Washington Post has published a phenomenal piece of investigative journalism: a long, detailed, and very interesting expose on the U.S. intelligence industry...

Internet Worm Targets SCADA
From Schneier on Security

Internet Worm Targets SCADA

Stuxnet is a new Internet worm that specifically targets Siemens WinCC SCADA systems: used to control production at industrial plants such as oil rigs, refineries...

More Research on the Effectiveness of Terrorist Profiling
From Schneier on Security

More Research on the Effectiveness of Terrorist Profiling

Interesting: The use of profiling by ethnicity or nationality to trigger secondary security screening is a controversial social and political issue. Overlooked...

Book on GCHQ
From Schneier on Security

Book on GCHQ

A book on GCHQ, and two reviews.

EU Counterterrorism Strategy
From Schneier on Security

EU Counterterrorism Strategy

Interesting journal article evaluating the EU's counterterrorism efforts.

Economic Considerations of Website Password Policies
From Schneier on Security

Economic Considerations of Website Password Policies

Two interesting research papers on website password policies. "Where Do Security Policies Come From?": Abstract: We examine the password policies of 75 different...

New GAO Cybersecurity Report
From Schneier on Security

New GAO Cybersecurity Report

From the U.S. Government Accountability Office: "Cybersecurity: Key Challenges Need to Be Addressed to Improve Research and Development." Thirty-six pages; I haven't...

Violating Terms of Service Possibly a Crime
From Schneier on Security

Violating Terms of Service Possibly a Crime

From Wired News: The four Wiseguy defendants, who also operated other ticket-reselling businesses, allegedly used sophisticated programming and inside information...

Embedded Code in U.S. Cyber Command Logo
From Schneier on Security

Embedded Code in U.S. Cyber Command Logo

This is excellent. And it's been cracked already.

Friday Squid Blogging: Hawaiian Bobtail Squid
From Schneier on Security

Friday Squid Blogging: Hawaiian Bobtail Squid

Symbiotic relationship between the Hawaiian bobtail squid and bioluminescent bacteria, with bonus security implications.

Skype's Cryptography Reverse-Engineered
From Schneier on Security

Skype's Cryptography Reverse-Engineered

Someone claims to have reverse-engineered Skype's proprietary encryption protocols, and has published pieces of it. If the crypto is good, this is less of a big...

The NSA's Perfect Citizen
From Schneier on Security

The NSA's Perfect Citizen

In what creepy back room do they come up with these names? The federal government is launching an expansive program dubbed "Perfect Citizen" to detect cyber assaults...

Russian Intelligence Gets Source Code to Windows 7
From Schneier on Security

Russian Intelligence Gets Source Code to Windows 7

I don't think this is a good idea.

Random Numbers from Quantum Noise
From Schneier on Security

Random Numbers from Quantum Noise

Not that we need more ways to get random numbers, but the research is interesting.

Burglary Detection through Video Analytics
From Schneier on Security

Burglary Detection through Video Analytics

This is interesting: Some of the scenarios where we have installed video analytics for our clients include: to detect someone walking in an area of their yard...

Caller ID Spoofing on the Android
From Schneier on Security

Caller ID Spoofing on the Android

It's easy to access someone else's voicemail by spoofing the caller ID. This isn't new; what is new is that many people now have easy access to caller ID spoofing...

Hemingway Authentication Scheme
From Schneier on Security

Hemingway Authentication Scheme

From 1955, intended as humor: In the future when I should ever call on the telephone to make a request or issue an order I will identify myself as follows: This...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account