acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Defending Against Liar Buyer Fraud
From Schneier on Security

Defending Against Liar Buyer Fraud

It's a common fraud on sites like eBay: buyers falsely claim that they never received a purchased item in the mail. Here's a paper on defending against this fraud...

Accountability as a Security System
From Schneier on Security

Accountability as a Security System

At a CATO surveillance event last month, Ben Wittes talked about inherent presidential powers of surveillance with this hypothetical: "What should Congress have...

US Law Enforcement Also Conducting Mass Telephone Surveillance
From Schneier on Security

US Law Enforcement Also Conducting Mass Telephone Surveillance

Late last year, in a criminal case involving export violations, the US government disclosed a mysterious database of telephone call records that it had queried...

New NSA Documents on Offensive Cyberoperations
From Schneier on Security

New NSA Documents on Offensive Cyberoperations

Appelbaum, Poitras and others have another NSA aticle with an enormous Snowden document dump on Der Spiegel, giving details on a variety of offensive NSA cyberoperations...

Friday Squid Blogging: "Squid Jiggin' Ground"
From Schneier on Security

Friday Squid Blogging: "Squid Jiggin' Ground"

Classic song written by Arthur Scammell and performed by Hank Snow. As usual, you can also use this squid post to talk about the security stories in the news that...

My Superpower
From Schneier on Security

My Superpower

For its "Top Influencers in Security You Should Be Following in 2015" blog post, TripWire asked me: "If you could have one infosec-related superpower, what would...

Common Risks in America: Cars and Guns
From Schneier on Security

Common Risks in America: Cars and Guns

I have long said that driving a car is the most dangerous thing regularly do in our lives. Turns out deaths due to automobiles are declining, while deaths due to...

3-1-1 for Encryption
From Schneier on Security

3-1-1 for Encryption

An excellent idea: 3­1­1 for encryption. RSA, DSA, and ECDSA must be 3.4 ounces (100bits) or less per container; must be in 1 quart-sized, clear, plastic, zip-top...

The Security of Data Deletion
From Schneier on Security

The Security of Data Deletion

Thousands of articles have called the December attack against Sony Pictures a wake-up call to industry. Regardless of whether the attacker was the North Korean...

Surveillance Detection for Android Phones
From Schneier on Security

Surveillance Detection for Android Phones

It's called SnoopSnitch: SnoopSnitch is an app for Android devices that analyses your mobile radio traffic to tell if someone is listening in on your phone conversations...

Keystroke Logger Disguised as a USB Charger
From Schneier on Security

Keystroke Logger Disguised as a USB Charger

It's called KeySweeper. More articles. Source code....

David Cameron's Plan to Ban Encryption in the UK
From Schneier on Security

David Cameron's Plan to Ban Encryption in the UK

In the wake of the Paris terrorist shootings, David Cameron has said that he wants to ban encryption in the UK. Here's the quote: "If I am prime minister I will...

The Risk of Unfounded Ebola Fears
From Schneier on Security

The Risk of Unfounded Ebola Fears

Good essay. Worry about Ebola (or anything) manifests physically as what's known as a fight, flight, or freeze response. Biological systems ramp up or down to focus...

Viking Runes as Encryption in the 1500s
From Schneier on Security

Viking Runes as Encryption in the 1500s

This is an interesting historical use of viking runes as a secret code. Yes, the page is all in Finnish. But scroll to the middle. There's a picture of the Stockholm...

How Surveillance Causes Writers to Self-Censor
From Schneier on Security

How Surveillance Causes Writers to Self-Censor

A worldwide survey of writers affiliated with PEN shows a significant level of self-censoring. From the press release: The report's revelations, based on a survey...

Friday Squid Blogging: Dumpling Squid and Sex
From Schneier on Security

Friday Squid Blogging: Dumpling Squid and Sex

This just in: the threat of being eaten doesn't deter dumpling squid from having sex. As usual, you can also use this squid post to talk about the security stories...

Smart Pipe
From Schneier on Security

Smart Pipe

Pretty impressive surveillance-economy satire....

Further Evidence Pointing to North Korea as Sony Hacker
From Schneier on Security

Further Evidence Pointing to North Korea as Sony Hacker

The FBI has provided more evidence: Speaking at a Fordham Law School cybersecurity conference Wednesday, Comey said that he has "very high confidence" in the FBI's...

How Browsers Store Passwords
From Schneier on Security

How Browsers Store Passwords

Good information on how Internet Explorer, Chrome, and Firefox store user passwords....

Hacking Attack Causes Physical Damage at German Steel Mill
From Schneier on Security

Hacking Attack Causes Physical Damage at German Steel Mill

This sort of thing is still very rare, but I fear it will become more common: ...hackers had struck an unnamed steel mill in Germany. They did so by manipulating...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account