acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Fear and Anxiety
From Schneier on Security

Fear and Anxiety

More psychological research on our reaction to terrorism and mass violence: The researchers collected posts on Twitter made in response to the 2012 shooting attack...

Survey of the Dark Web
From Schneier on Security

Survey of the Dark Web

Interesting paper on the dark web: Daniel Moore & Thomas Rid, "Cryptopolitik and the Darknet," Survival, 2016. (Technical annex here -- requires the Tor browser...

Friday Squid Blogging : Pajama Squid
From Schneier on Security

Friday Squid Blogging : Pajama Squid

The Monterey Bay Aquarium has a pajama squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.....

Fitbit Data Reveals Pregnancy
From Schneier on Security

Fitbit Data Reveals Pregnancy

A man learned his wife was pregnant from her Fitbit data. The details of the story are weird. The man posted the data to Reddit and asked for analysis help. But...

Determining Physical Location on the Internet
From Schneier on Security

Determining Physical Location on the Internet

Interesting research: "CPV: Delay-based Location Verification for the Internet": Abstract: The number of location-aware services over the Internet continues growing...

Worldwide Encryption Products Survey
From Schneier on Security

Worldwide Encryption Products Survey

Today I released my worldwide survey of encryption products. The findings of this survey identified 619 entities that sell encryption products. Of those 412, or...

Make Privacy a 2016 Election Issue
From Schneier on Security

Make Privacy a 2016 Election Issue

EPIC has just launched "Data Protection 2016" to try to make privacy an issue in this year's elections. You can buy swag....

AT&T Does Not Care about Your Privacy
From Schneier on Security

AT&T Does Not Care about Your Privacy

AT&T's CEO believes that the company should not offer robust security to its customers: But tech company leaders aren't all joining the fight against the deliberate...

10,000-Year-Old Warfare
From Schneier on Security

10,000-Year-Old Warfare

Evidence of primitive warfare from Kenya's Rift Valley....

The 2016 National Threat Assessment
From Schneier on Security

The 2016 National Threat Assessment

It's National Threat Assessment Day. Published annually by the Director of National Intelligence, the "Worldwide Threat Assessment of the US Intelligence Community"...

Large-Scale FBI Hacking
From Schneier on Security

Large-Scale FBI Hacking

As part of a child pornography investigation, the FBI hacked into over 1,300 computers. But after Playpen was seized, it wasn't immediately closed down, unlike...

Data and Goliath Published in Paperback
From Schneier on Security

Data and Goliath Published in Paperback

Today, Data and Goliath is being published in paperback. Everyone tells me that the paperback version sells better than the hardcover, even though it's a year later...

Exploiting Google Maps for Fraud
From Schneier on Security

Exploiting Google Maps for Fraud

The New York Times has a long article on fraudulent locksmiths. The scam is a basic one: quote a low price on the phone, but charge much more once you show up and...

Friday Squid Blogging: Squid Knitting Pattern
From Schneier on Security

Friday Squid Blogging: Squid Knitting Pattern

Surprisingly realistic for a knitted stuffed animal....

NSA Reorganizing
From Schneier on Security

NSA Reorganizing

The NSA is undergoing a major reorganization, combining its attack and defense sides into a single organization: In place of the Signals Intelligence and Information...

Tracking Anonymous Web Users
From Schneier on Security

Tracking Anonymous Web Users

This research shows how to track e-commerce users better across multiple sessions, even when they do not provide unique identifiers such as user IDs or cookies....

The Internet of Things Will Be the World's Biggest Robot
From Schneier on Security

The Internet of Things Will Be the World's Biggest Robot

The Internet of Things is the name given to the computerization of everything in our lives. Already you can buy Internet-enabled thermostats, light bulbs, refrigerators...

Security vs. Surveillance
From Schneier on Security

Security vs. Surveillance

Both the "going dark" metaphor of FBI Director James Comey and the contrasting "golden age of surveillance" metaphor of privacy law professor Peter Swire focus...

Paper on the Going Dark Debate
From Schneier on Security

Paper on the Going Dark Debate

I am pleased to have been a part of this report, part of the Berkman Center's Berklett Cybersecurity project: Don't Panic: Making Progress on the "Going Dark" Debate...

More Details on the NSA Switching to Quantum-Resistant Cryptography
From Schneier on Security

More Details on the NSA Switching to Quantum-Resistant Cryptography

The NSA is publicly moving away from cryptographic algorithms vulnerable to cryptanalysis using a quantum computer. It just published a FAQ about the process: Q...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account