acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Pew Research Survey on Privacy Perceptions
From Schneier on Security

Pew Research Survey on Privacy Perceptions

Pew Research has released a new survey on American's perceptions of privacy. The results are pretty much in line with all the other surveys on privacy I've read...

ISPs Blocking TLS Encryption
From Schneier on Security

ISPs Blocking TLS Encryption

It's not happening often, but it seems that some ISPs are blocking STARTTLS messages and causing web encryption to fail. EFF has the story....

Narrowly Constructing National Surveillance Law
From Schneier on Security

Narrowly Constructing National Surveillance Law

Orin Kerr has a new article that argues for narrowly constructing national security law: This Essay argues that Congress should adopt a rule of narrow construction...

Sophisticated Targeted Attack Via Hotel Networks
From Schneier on Security

Sophisticated Targeted Attack Via Hotel Networks

Kaspersky Labs is reporting (detailed report here, technical details here) on a sophisticated hacker group that is targeting specific individuals around the world...

Hacking Internet Voting from Wireless Routers
From Schneier on Security

Hacking Internet Voting from Wireless Routers

Good paper, and layman's explanation. Internet voting scares me. It gives hackers the potential to seriously disrupt our democratic processes....

The Future of Incident Response
From Schneier on Security

The Future of Incident Response

Security is a combination of protection, detection, and response. It's taken the industry a long time to get to this point, though. The 1990s was the era of protection...

Friday Squid Blogging: Dried Squid Sold in Korean Baseball Stadiums
From Schneier on Security

Friday Squid Blogging: Dried Squid Sold in Korean Baseball Stadiums

I'm not sure why this is news, except that it makes for a startling headline. (Is the New York Times now into clickbait?) It's not as if people are throwing squid...

Co3 Systems Is Hiring
From Schneier on Security

Co3 Systems Is Hiring

My company, Co3 Systems, is hiring both technical and nontechnical positions. If you live in the Boston area, click through and take a look....

Testing for Explosives in the Chicago Subway
From Schneier on Security

Testing for Explosives in the Chicago Subway

Chicago is doing random explosives screenings at random L stops in the Chicago area. Compliance is voluntary: Police made no arrests but one rider refused to submit...

Why Hyping Cyber Threats is Counterproductive
From Schneier on Security

Why Hyping Cyber Threats is Counterproductive

Robert Lee and Thomas Rid have a new paper: "OMG Cyber! Thirteen Reasons Why Hype Makes for Bad Policy."...

How the Internet Affects National Sovereignty
From Schneier on Security

How the Internet Affects National Sovereignty

Interesting paper by Melissa Hathaway: "Connected Choices: How the Internet Is Challenging Sovereign Decisions." Abstract: Modern societies are in the middle of...

Verizon Tracking Mobile Internet Use
From Schneier on Security

Verizon Tracking Mobile Internet Use

Verizon is tracking the Internet use of their phones by surreptitiously modifying URLs. This is a good description of how it works....

Adam Shostack's Threat Modeling
From Schneier on Security

Adam Shostack's Threat Modeling

Probably the best IT security book of the year is Adam Shostack's Threat Modeling. The book is an honorable mention finalist for "The Best Books" of the past 12...

Friday Squid Blogging: Little Squid
From Schneier on Security

Friday Squid Blogging: Little Squid

Beautiful photo. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Hacking Team Documentation
From Schneier on Security

Hacking Team Documentation

The Intercept has published the complete manuals for Hacking Team's attack software. This follows a detailed report on Hacking Team's products from August. Hacking...

Enigma Simulator
From Schneier on Security

Enigma Simulator

Good article, with pictures, diagrams, and code....

The Risk of Unfounded Ebola Fears
From Schneier on Security

The Risk of Unfounded Ebola Fears

Good essay. Worry about Ebola (or anything) manifests physically as what's known as a fight, flight, or freeze response. Biological systems ramp up or down to focus...

Adobe Book Reader Surveillance
From Schneier on Security

Adobe Book Reader Surveillance

Details. Confirmation....

FDA Guidance on Medical Device Cybersecurity
From Schneier on Security

FDA Guidance on Medical Device Cybersecurity

The Food and Drug Administration has released guidelines regarding the security of medical devices. I admit that I have not read it....

Survey on What Americans Fear
From Schneier on Security

Survey on What Americans Fear

Interesting data: Turning to the crime section of the Chapman Survey on American Fears, the team discovered findings that not only surprised them, but also those...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account