acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Friday Squid Blogging: Squid Salad Servers
From Schneier on Security

Friday Squid Blogging: Squid Salad Servers

Nice. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Counterfeit Social Media Accounts
From Schneier on Security

Counterfeit Social Media Accounts

Interesting article on the inner workings of a Facebook account farm, with commentary on fake social media accounts in general....

Hacking Drug Pumps
From Schneier on Security

Hacking Drug Pumps

When you connect hospital drug pumps to the Internet, they're hackable -- only surprising people who aren't paying attention. Rios says when he first told Hospira...

Research on The Trade-off Between Free Services and Personal Data
From Schneier on Security

Research on The Trade-off Between Free Services and Personal Data

New report: "The Tradeoff Fallacy: How marketers are misrepresenting American consumers and opening them up to exploitation." New Annenberg survey results indicate...

Peter Swire on the USA FREEDOM Act
From Schneier on Security

Peter Swire on the USA FREEDOM Act

Peter Swire, law professor and one of the members of the President's review group on the NSA, writes about intelligence reform and the USA FREEDOM Act....

Encrypting Windows Hard Drives
From Schneier on Security

Encrypting Windows Hard Drives

Encrypting your Windows hard drives is trivially easy; choosing which program to use is annoyingly difficult. I still use Windows -- yes, I know, don't even start...

Eighth Movie-Plot Threat Contest Winner
From Schneier on Security

Eighth Movie-Plot Threat Contest Winner

On April 1, I announced the Eighth Movie-Plot Threat Contest: I want a movie-plot threat that shows the evils of encryption. (For those who don't know, a movie-plot...

Friday Squid Blogging: Dancing Zombie Squid
From Schneier on Security

Friday Squid Blogging: Dancing Zombie Squid

How dead squid is made to dance when soy sauce is poured on it. As usual, you can also use this squid post to talk about the security stories in the news that I...

Uh Oh -- Robots Are Getting Good with Samurai Swords
From Schneier on Security

Uh Oh -- Robots Are Getting Good with Samurai Swords

It's Iaido, not sword fighting, but still. Of course, the two didn't battle each other, but competed in Iaido tests like cutting mats and flowers in various cross...

The History of Internet Insecurity
From Schneier on Security

The History of Internet Insecurity

The Washington Post has a good two part story on the history of insecurity of the Internet....

Duqu 2.0
From Schneier on Security

Duqu 2.0

Kaspersky Labs has discovered and publicized details of a new nation-state surveillance malware system, called Duqu 2.0. It's being attributed to Israel. There's...

Security and Human Behavior (SHB 2015)
From Schneier on Security

Security and Human Behavior (SHB 2015)

Earlier this week, I was at the eighth Workshop on Security and Human Behavior. This is a small invitational gathering of people studying various aspects of the...

Reassessing Airport Security
From Schneier on Security

Reassessing Airport Security

News that the Transportation Security Administration missed a whopping 95% of guns and bombs in recent airport security "red team" tests was justifiably shocking...

Should Companies Do Most of Their Computing in the Cloud? (Part 3)
From Schneier on Security

Should Companies Do Most of Their Computing in the Cloud? (Part 3)

Cloud computing is the future of computing. Specialization and outsourcing make society more efficient and scalable, and computing isn't any different. But why...

Should Companies Do Most of Their Computing in the Cloud? (Part 2)
From Schneier on Security

Should Companies Do Most of Their Computing in the Cloud? (Part 2)

Let me start by describing two approaches to the cloud. Most of the students I meet at Harvard University live their lives in the cloud. Their e-mail, documents...

Should Companies Do Most of Their Computing in the Cloud? (Part 1)
From Schneier on Security

Should Companies Do Most of Their Computing in the Cloud? (Part 1)

Yes. No. Yes. Maybe. Yes. Okay, it's complicated. The economics of cloud computing are compelling. For companies, the lower operating costs, the lack of capital...

The Effects of Near Misses on Risk Decision-Making
From Schneier on Security

The Effects of Near Misses on Risk Decision-Making

This is interesting research: "How Near-Miss Events Amplify or Attenuate Risky Decision Making," Catherine H. Tinsley, Robin L. Dillon, and Matthew A. Cronin. In...

Surveillance Law and Surveillance Studies
From Schneier on Security

Surveillance Law and Surveillance Studies

Interesting paper by Julie Cohen: Abstract: The dialogue between law and Surveillance Studies has been complicated by a mutual misrecognition that is both theoretical...

Tracking People By Smart Phone Accelerometers
From Schneier on Security

Tracking People By Smart Phone Accelerometers

Interesting research: "We Can Track You If You Take the Metro: Tracking Metro Riders Using Accelerometers on Smartphones": Abstract: Motion sensors (e.g., accelerometers)...

Friday Squid Blogging: Giant Squid Lore
From Schneier on Security

Friday Squid Blogging: Giant Squid Lore

Legends of giant squid go back centuries: In his book "The Search for the Giant Squid" marine biologist Richard Ellis notes that "There is probably no apparition...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account