acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Did Kaspersky Fake Malware?
From Schneier on Security

Did Kaspersky Fake Malware?

Two former Kaspersky employees have accused the company of faking malware to harm rival antivirus products. They would falsely classify legitimate files as malicious...

More  on Mail Cover
From Schneier on Security

More on Mail Cover

I've previously written about mail cover -- the practice of recording the data on mail envelopes. Sai has been covering the issue in more detail, and recently received...

Data and Goliath Confiscated from Chelsea Manning
From Schneier on Security

Data and Goliath Confiscated from Chelsea Manning

One of the books confiscated from Chelsea Manning was a copy of Data and Goliath....

Oracle CSO Rant Against Security Experts
From Schneier on Security

Oracle CSO Rant Against Security Experts

Oracle's CSO Mary Ann Davidson wrote a blog post ranting against security experts finding vulnerabilities in her company's products. The blog post has been taken...

NSA's Partnership with AT&T
From Schneier on Security

NSA's Partnership with AT&T

There's a new article, published jointly by The New York Times and ProPublica, aboutNSA's longstanding relationship with AT&T. It's based on the Snowden documents...

Friday Squid Blogging: Strawberry Squid
From Schneier on Security

Friday Squid Blogging: Strawberry Squid

I think it's a very pretty creature with some impressive adaptations. As usual, you can also use this squid post to talk about the security stories in the news...

Algorithmic Bias
From Schneier on Security

Algorithmic Bias

Good Q&A with Cynthia Dwork on algorithmic bias....

Cryptography from the 13th Century
From Schneier on Security

Cryptography from the 13th Century

The British Museum wants help breaking a code on a 13th-century sword....

Cosa Nostra Dead Drops
From Schneier on Security

Cosa Nostra Dead Drops

Good operational security is hard, and often uses manual technologies: Investigators described how Messina Denaro, 53, disdains telecommunications and relies on...

Another Salvo in the Second Crypto War (of Words)
From Schneier on Security

Another Salvo in the Second Crypto War (of Words)

Prosecutors from New York, London, Paris, and Madrid wrote an op-ed in yesterday's New York Times in favor of backdoors in cell phone encryption. There are a number...

Intimidating Military Personnel by Targeting Their Families
From Schneier on Security

Intimidating Military Personnel by Targeting Their Families

This FBI alert is interesting: (U//FOUO) In May 2015, the wife of a US military member was approached in front of her home by two Middle-Eastern males. The men...

Incenting Drug Dealers to Snitch on Each Other
From Schneier on Security

Incenting Drug Dealers to Snitch on Each Other

Local police are trying to convince drug dealers to turn each other in by pointing out that it reduces competition. It's a comical tactic with serious results:...

Detecting Betrayal in Diplomacy Games
From Schneier on Security

Detecting Betrayal in Diplomacy Games

Interesting research detecting betrayal in the game of Diplomacy by analyzing interplayer messages. One harbinger was a shift in politeness. Players who were excessively...

Friday Squid Blogging: Divers Find Squid Eggs
From Schneier on Security

Friday Squid Blogging: Divers Find Squid Eggs

Divers discover a large mass of Ommastrephes bartramii eggs: Earlier this month, a team of divers swimming off the coast of Turkey discovered something unexpected...

Meerkats that Look like Bruce Schneier
From Schneier on Security

Meerkats that Look like Bruce Schneier

Yet another example of my surreal life. (No, I have no idea who did this.)...

The Outing of ECHELON
From Schneier on Security

The Outing of ECHELON

Before Edward Snowden told us so much about NSA surveillance, before Mark Klein told us a little, even before 9/11, Duncan Campbell broke the story of ECHELON....

Security for the Rest of Us
From Schneier on Security

Security for the Rest of Us

Good fictional account of an average computer user and how people understand and view security. Related: "Real World Use Cases for High-Risk Users."...

Nicholas Weaver on iPhone Security
From Schneier on Security

Nicholas Weaver on iPhone Security

Excellent essay: Yes, an iPhone configured with a proper password has enough protection that, turned off, I'd be willing to hand mine over to the DGSE, NSA, or...

Face Recognition by Thermal Imaging
From Schneier on Security

Face Recognition by Thermal Imaging

New research can identify a person by reading their thermal signature in complete darkness and then matching it with ordinary photographs. Research paper: Abstract...

Shooting Down Drones
From Schneier on Security

Shooting Down Drones

A Kentucky man shot down a drone that was hovering in his backyard: "It was just right there," he told Ars. "It was hovering, I would never have shot it if it was...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account