acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Friday Squid Blogging: Ceramic Squid Planters
From Schneier on Security

Friday Squid Blogging: Ceramic Squid Planters

Nice....

Digital Privacy Public Service Announcement
From Schneier on Security

Digital Privacy Public Service Announcement

I thought this was very well done....

Ears as a Biometric
From Schneier on Security

Ears as a Biometric

It's an obvious biometric for cell phones: Bodyprint recognizes users by their ears with 99.8% precision with a false rejection rate of only 1 out of 13. Grip,...

Measuring the Expertise of Burglars
From Schneier on Security

Measuring the Expertise of Burglars

New research paper: "New methods for examining expertise in burglars in natural and simulated environments: preliminary findings": Expertise literature in mainstream...

Protecting Against Google Phishing in Chrome
From Schneier on Security

Protecting Against Google Phishing in Chrome

Google has a new Chrome extension called "Password Alert": To help keep your account safe, today we're launching Password Alert, a free, open-source Chrome extension...

Remote Proctoring and Surveillance
From Schneier on Security

Remote Proctoring and Surveillance

Interesting article. There are a lot of surveillance and privacy issues at play here....

Shaking Someone Down for His Password
From Schneier on Security

Shaking Someone Down for His Password

A drug dealer claims that the police leaned him over an 18th floor balcony and threatened to kill him if he didn't give up his password. One of the policemen involved...

Nice Essay on Security Snake Oil
From Schneier on Security

Nice Essay on Security Snake Oil

This is good: Just as "data" is being sold as "intelligence", a lot of security technologies are being sold as "security solutions" rather than what they for the...

The History of Lockpicking
From Schneier on Security

The History of Lockpicking

Interesting....

The Further Democratization of Stingray
From Schneier on Security

The Further Democratization of Stingray

Stingray is the code name for an IMSI-catcher, which is basically a fake cell phone tower sold by Harris Corporation to various law enforcement agencies. (It's...

Friday Squid Blogging: The Unique Reproductive Habits of the Vampire Squid
From Schneier on Security

Friday Squid Blogging: The Unique Reproductive Habits of the Vampire Squid

Interesting: While most female squid and octopuses have just one reproductive cycle before they die, vampire squid go through dozens of egg-making cycles in their...

Signed Copies of Data and Goliath
From Schneier on Security

Signed Copies of Data and Goliath

You can now order signed copies of Data and Goliath from my website....

Federal Trade Commissioner Julie Brill on Obscurity
From Schneier on Security

Federal Trade Commissioner Julie Brill on Obscurity

I think this is good: Obscurity means that personal information isn't readily available to just anyone. It doesn't mean that information is wiped out or even locked...

The Further Democratization of QUANTUM
From Schneier on Security

The Further Democratization of QUANTUM

From Data and Goliath: ...when I was working with the Guardian on the Snowden documents, the one top-secret program the NSA desperately did not want us to expose...

An Incredibly Insecure Voting Machine
From Schneier on Security

An Incredibly Insecure Voting Machine

Wow: The weak passwords -- which are hard-coded and can't be changed -- were only one item on a long list of critical defects uncovered by the review. The Wi-Fi...

"Hinky" in Action
From Schneier on Security

"Hinky" in Action

In Beyond Fear I wrote about trained officials recognizing "hinky" and how it differs from profiling: Ressam had to clear customs before boarding the ferry. He...

Hacking Airplanes
From Schneier on Security

Hacking Airplanes

Imagine this: A terrorist hacks into a commercial airplane from the ground, takes over the controls from the pilots and flies the plane into the ground. It sounds...

Hacker Detained by FBI after Tweeting about Airplane Software Vulnerabilities
From Schneier on Security

Hacker Detained by FBI after Tweeting about Airplane Software Vulnerabilities

This is troubling: Chris Roberts was detained by FBI agents on Wednesday as he was deplaning his United flight, which had just flown from Denver to Syracuse, New...

Counting the US Intelligence Community Leakers
From Schneier on Security

Counting the US Intelligence Community Leakers

It's getting hard to keep track of the US intelligence community leakers without a scorecard. So here's my attempt: Leaker #1: Chelsea Manning. Leaker #2: Edward...

New Top Secret Information on the US's Drone Program
From Schneier on Security

New Top Secret Information on the US's Drone Program

New operational information on the US's drone program, published by the Intercept and Der Speigel....
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account