acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Real-World Security and the Internet of Things
From Schneier on Security

Real-World Security and the Internet of Things

Disaster stories involving the Internet of Things are all the rage. They feature cars (both driven and driverless), the power grid, dams, and tunnel ventilation...

Detecting When a Smartphone Has Been Compromised
From Schneier on Security

Detecting When a Smartphone Has Been Compromised

Andrew "bunnie" Huang and Edward Snowden have designed a smartphone case that detects unauthorized transmissions by the phone. Paper. Three news articles. Looks...

The NSA and "Intelligence Legalism"
From Schneier on Security

The NSA and "Intelligence Legalism"

Interesting law journal paper: "Intelligence Legalism and the National Security Agency's Civil Liberties Gap," by Margo Schlanger: Abstract: This paper examines...

Russian Hack of the DNC
From Schneier on Security

Russian Hack of the DNC

Amazingly enough, the preponderance of the evidence points to Russia as the source of the DNC leak. I was going to summarize the evidence, but Thomas Rid did a...

Tracking the Owner of Kickass Torrents
From Schneier on Security

Tracking the Owner of Kickass Torrents

Here's the story of how it was done. First, a fake ad on torrent listings linked the site to a Latvian bank account, an e-mail address, and a Facebook page. Using...

Decoded, by Mai Jai
From Schneier on Security

Decoded, by Mai Jai

Has anyone read this book?...

The Economist on Hacking the Financial System
From Schneier on Security

The Economist on Hacking the Financial System

The Economist has an article on the potential hacking of the global financial system, both for profit or to cause mayhem. It's reasonably balanced. So how might...

Friday Squid Blogging: Sperm Whale Eats Squid
From Schneier on Security

Friday Squid Blogging: Sperm Whale Eats Squid

A post-mortem of a stranded sperm whale shows that he had recently eaten squid. As usual, you can also use this squid post to talk about the security stories in...

Cyber Weapons vs Nuclear Weapons
From Schneier on Security

Cyber Weapons vs Nuclear Weapons

Good essay pointing out the absurdity of comparing cyber weapons with nuclear weapons. On the surface, the analogy is compelling. Like nuclear weapons, the most...

DARPA Document: "On Countering Strategic Deception"
From Schneier on Security

DARPA Document: "On Countering Strategic Deception"

Old, but interesting. The document was published by DARPA in 1973, and approved for release in 2007. It examines the role of deception on strategic warning systems...

Detecting Spoofed Messages Using Clock Skew
From Schneier on Security

Detecting Spoofed Messages Using Clock Skew

Two researchers are working on a system to detect spoofed messages sent to automobiles by fingerprinting the clock skew of the various computer components within...

Stealing Money from ISPs Through Premium Rate Calls
From Schneier on Security

Stealing Money from ISPs Through Premium Rate Calls

I think the best hacks are the ones that are obvious once they're explained, but no one has thought of them before. Here's an example: Instagram ($2000), Google...

Futuristic Cyberattack Scenario
From Schneier on Security

Futuristic Cyberattack Scenario

This is a piece of near-future fiction about a cyberattack on New York, including hacking of cars, the water system, hospitals, elevators, and the power grid. Although...

Friday Squid Blogging: Stuffed Squid with Chard and Potatoes
From Schneier on Security

Friday Squid Blogging: Stuffed Squid with Chard and Potatoes

Looks like a tasty recipe. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

I Have Joined the Board of Directors of the Tor Project
From Schneier on Security

I Have Joined the Board of Directors of the Tor Project

This week, I have joined the board of directors of the Tor Project. Slashdot thread. Hacker News thread....

Security Effectiveness of the Israeli West Bank Barrier
From Schneier on Security

Security Effectiveness of the Israeli West Bank Barrier

Interesting analysis: Abstract: Objectives -- Informed by situational crime prevention (SCP) this study evaluates the effectiveness of the "West Bank Barrier" that...

Visiting a Website against the Owner's Wishes Is Now a Federal Crime
From Schneier on Security

Visiting a Website against the Owner's Wishes Is Now a Federal Crime

While we're on the subject of terrible 9th Circuit Court rulings: The U.S. Court of Appeals for the 9th Circuit has handed down a very important decision on the...

Password Sharing Is Now a Crime
From Schneier on Security

Password Sharing Is Now a Crime

In a truly terrible ruling, the US 9th Circuit Court ruled that using someone else's password with their permission but without the permission of the site owner...

Google's Post-Quantum Cryptography
From Schneier on Security

Google's Post-Quantum Cryptography

News has been bubbling about an announcement by Google that it's starting to experiment with public-key cryptography that's resistant to cryptanalysis by a quantum...

Report on the Vulnerabilities Equities Process
From Schneier on Security

Report on the Vulnerabilities Equities Process

I have written before on the vulnerabilities equities process (VEP): the system by which the US government decides whether to disclose and fix a computer vulnerability...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account