acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Primitive Food Crops and Security
From Schneier on Security

Primitive Food Crops and Security

Economists argue that the security needs of various crops are the cause of civilization size: The argument depends on the differences between how grains and tubers...

More NSA Documents from the Snowden Archive
From Schneier on Security

More NSA Documents from the Snowden Archive

The Intercept is starting to publish a lot more documents. Yesterday they published the first year of an internal newsletter called SIDtoday, along with several...

Unforeseen Costs of Security Training
From Schneier on Security

Unforeseen Costs of Security Training

At the last match of the year for Manchester United, someone found a bomb in a toilet, and security evacuated all 75,000 people and canceled the match. Turns out...

Defeating a Tamper-Proof Bottle
From Schneier on Security

Defeating a Tamper-Proof Bottle

Here's an interesting case of doctored urine-test samples from the Sochi Olympics. Evidence points to someone defeating the tamper-resistance of the bottles: Berlinger...

Friday Squid Blogging: Counterfeit Squid
From Schneier on Security

Friday Squid Blogging: Counterfeit Squid

Goya is facing a $5 million lawsuit; the plaintiff is claiming its canned octopus is really squid. As usual, you can also use this squid post to talk about the...

Scam or Satire?
From Schneier on Security

Scam or Satire?

You decide....

More on the Going Dark Debate
From Schneier on Security

More on the Going Dark Debate

Lawfare is turning out to be the go-to blog for policy wonks about various government debates on cybersecurity. There are two good posts this week on the Going...

Hacking Gesture-Based Security
From Schneier on Security

Hacking Gesture-Based Security

Interesting research: Abdul Serwadda, Vir V. Phoha, Zibo Wang, Rajesh Kumar, and Diksha Shukla, "Robotic Robbery on the Touch Screen," ACM Transactions on Information...

FTC Investigating Android Patching Practices
From Schneier on Security

FTC Investigating Android Patching Practices

It's a known truth that most Android vulnerabilities don't get patched. It's not Google's fault. They release the patches, but the phone carriers don't push them...

New Credit Card Scam
From Schneier on Security

New Credit Card Scam

A criminal ring was arrested in Malaysia for credit card fraud: They would visit the online shopping websites and purchase all their items using phony credit card...

Children of Spies
From Schneier on Security

Children of Spies

Fascinating story of Tim and Alex Foley, the children of Russian spies Donald Heathfield and Tracey Foley....

Economist Detained for Doing Math on an Airplane
From Schneier on Security

Economist Detained for Doing Math on an Airplane

An economics professor was detained when he was spotted doing math on an airplane: On Thursday evening, a 40-year-old man ­-- with dark, curly hair, olive skin...

NIST Starts Planning for Post-Quantum Cryptography
From Schneier on Security

NIST Starts Planning for Post-Quantum Cryptography

Last year, the NSA announced its plans for transitioning to cryptography that is resistant to a quantum computer. Now, it's NIST's turn. Its just-released report...

Friday Squid Blogging: Firefly Squid in the News
From Schneier on Security

Friday Squid Blogging: Firefly Squid in the News

It's a good time to see firefly squid in Japan. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered...

Dilbert on Electronic Voting Machines
From Schneier on Security

Dilbert on Electronic Voting Machines

Accurate (the cartoon, not the machines)....

White House Report on Big Data Discrimination
From Schneier on Security

White House Report on Big Data Discrimination

The White House has released a report on big-data discrimination. From the blog post: Using case studies on credit lending, employment, higher education, and criminal...

Own a Pair of Clipper Chips
From Schneier on Security

Own a Pair of Clipper Chips

The AT&T TSD was an early 1990s telephone encryption device. It was digital. Voice quality was okay. And it was the device that contained the infamous Clipper Chip...

$7 Million Social Media Privacy Mistake
From Schneier on Security

$7 Million Social Media Privacy Mistake

Forbes estimates that football player Laremy Tunsil lost $7 million in salary because of an ill-advised personal video made public....

Credential Stealing as an Attack Vector
From Schneier on Security

Credential Stealing as an Attack Vector

Traditional computer security concerns itself with vulnerabilities. We employ antivirus software to detect malware that exploits vulnerabilities. We have automatic...

Julian Sanchez on the Feinstein-Burr Bill
From Schneier on Security

Julian Sanchez on the Feinstein-Burr Bill

Two excellent posts....
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account