acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Issues Regarding Lone-Wolf Terrorism Prevention
From Schneier on Security

Issues Regarding Lone-Wolf Terrorism Prevention

Amy Zegert has some good questions, comparing the Orlando Pulse massacre to the Fort Hood massacre from 2009....

Situational Awareness and Crime Prevention
From Schneier on Security

Situational Awareness and Crime Prevention

Ronald V. Clarke argues for more situational awareness in crime prevention. Turns out if you make crime harder, it goes down. And this has profound policy implications...

Security Behavior of Pro-ISIS Groups on Social Media
From Schneier on Security

Security Behavior of Pro-ISIS Groups on Social Media

Interesting: Since the team had tracked these groups daily, researchers could observe the tactics that pro-ISIS groups use to evade authorities. They found that...

CIA Director John Brennan Pretends Foreign Cryptography Doesn't Exist
From Schneier on Security

CIA Director John Brennan Pretends Foreign Cryptography Doesn't Exist

Last week, CIA director John Brennan told a Senate committee that there wasn't any strong cryptography outside of the US. CIA director John Brennan told US senators...

Nude Photos as Loan Collateral
From Schneier on Security

Nude Photos as Loan Collateral

The New York Times is reporting that some women in China are being forced to supply nude photos of themselves as collateral for getting a loan. Aside from the awfulness...

Friday Squid Blogging: Not Finding a Giant Squid on Google Earth
From Schneier on Security

Friday Squid Blogging: Not Finding a Giant Squid on Google Earth

The Internet is buzzing -- at least, my little corner of the Internet -- about finding a 120-meter-long giant squid on Google Earth. It's a false alarm. As usual...

XKCD Phishing Cartoon
From Schneier on Security

XKCD Phishing Cartoon

Funny. The mouseover is the best part....

Computer Science Education Is Security Education
From Schneier on Security

Computer Science Education Is Security Education

This essay argues that teaching computer science at the K-12 level is a matter of national security. I think the argument is even broader. Computers, networks,...

Apple's Differential Privacy
From Schneier on Security

Apple's Differential Privacy

At the Apple Worldwide Developers Conference earlier this week, Apple talked about something called "differential privacy." We know very little about the details...

Infecting Systems by Typosquatting Programming Language Libraries
From Schneier on Security

Infecting Systems by Typosquatting Programming Language Libraries

Typosquatting is an old trick of registering a domain name a typo away from a popular domain name and using it for various nefarious purposes. Nikolai Philipp Tschacher...

Russians Hacking DNC Computers
From Schneier on Security

Russians Hacking DNC Computers

The Washington Post is reporting that Russian hackers penetrated the network of the Democratic National Committee and stole opposition research on Donald Trump....

NSA Using Insecure Word Macros
From Schneier on Security

NSA Using Insecure Word Macros

There's an interesting message in the documents about Snowden that Vice magazine got out of the NSA with a FOIA request. At least in 2012, the NSA was using Word...

Friday Squid Blogging: Beautiful Squid Sculpture
From Schneier on Security

Friday Squid Blogging: Beautiful Squid Sculpture

Two years ago, I posted a photograph of a beautiful giant bronze squid sculpture by Kirk McGuire. He has a new sculpture: a squid table base. it's also beautiful...

Financial Cyber Risk Is Not Systemic Risk
From Schneier on Security

Financial Cyber Risk Is Not Systemic Risk

This interesting essay argues that financial risks are generally not systemic risks, and instead are generally much smaller. That's certainly been our experience...

1944 CIA Sabotage Manual
From Schneier on Security

1944 CIA Sabotage Manual

It makes for interesting reading. Someone noticed that parts of it read like standard modern office procedures....

Wayz Data Poisoning
From Schneier on Security

Wayz Data Poisoning

People who don't want Wayz routing cars through their neighborhoods are feeding it false data. It was here that Connor learned that some Waze warriors had launched...

Inherent Bias in Recidivism Algorithm
From Schneier on Security

Inherent Bias in Recidivism Algorithm

Really good investigative reporting on the automatic algorithms used to predict recidivism rates....

Long Article on Snowden's Attempts to Raise His Concerns Inside the NSA
From Schneier on Security

Long Article on Snowden's Attempts to Raise His Concerns Inside the NSA

Lots of details that demonstrate that Snowden did try to raise his concerns internally before going public, and that the NSA lied about this....

Another Side-Channel Attack on PC Encryption
From Schneier on Security

Another Side-Channel Attack on PC Encryption

New paper: "Physical Key Extraction Attacks on PCs," by Daniel Genkin, Lev Pachmanov, Itamar Pipman, Adi Shamir, and Eran Tromer. They recover keys acoustically...

Hijacking the PC Update Process
From Schneier on Security

Hijacking the PC Update Process

There's a new report on security vulnerabilities in the PC initialization/update process, allowing someone to hijack it to install malware: One of the major things...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account