acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Lesson in Successful Disaster Planning
From Schneier on Security

Lesson in Successful Disaster Planning

I found the story of the Federal Reserve on 9/11 to be fascinating. It seems they just flipped a switch on all their Y2K preparations, and it worked....

Kill Switches for Weapons
From Schneier on Security

Kill Switches for Weapons

Jonathan Zittrain argues that our military weapons should be built with a kill switch, so they become useless when they fall into enemy hands....

Security for Vehicle-to-Vehicle Communications
From Schneier on Security

Security for Vehicle-to-Vehicle Communications

The National Highway Traffic Safety Administration (NHTSA) has released a report titled "Vehicle-to-Vehicle Communications: Readiness of V2V Technology for Application...

Friday Squid Blogging: Colossal Squid Dissected in New Zealand
From Schneier on Security

Friday Squid Blogging: Colossal Squid Dissected in New Zealand

Months after it was found in August, scientists have dissected a colossal squid. As usual, you can also use this squid post to talk about the security stories in...

iOS 8 Security
From Schneier on Security

iOS 8 Security

Apple claims that they can no longer unlock iPhones, even if the police show up with a warrant. Of course they still have access to everything in iCloud, but it's...

Fake Cell Phone Towers Across the US
From Schneier on Security

Fake Cell Phone Towers Across the US

Earlier this month, there were a bunch of stories about fake cell phone towers discovered around the US These seems to be ISMI catchers, like Harris Corporation's...

Terrible Article on Vernam Ciphers
From Schneier on Security

Terrible Article on Vernam Ciphers

If there's anything that confuses wannabe cryptographers, it's one-time pads....

The Full Story of Yahoo's Fight Against PRISM
From Schneier on Security

The Full Story of Yahoo's Fight Against PRISM

In 2008 Yahoo fought the NSA to avoid becoming part of the PRISM program. They eventually lost their court battle, and at one point were threatened with a $250,000...

Identifying Dread Pirate Roberts
From Schneier on Security

Identifying Dread Pirate Roberts

According to court documents, Dread Pirate Roberts was identified because a CAPTCHA service used on the Silk Road login page leaked the users' true location....

Tracking People From their Cellphones with an SS7 Vulnerability
From Schneier on Security

Tracking People From their Cellphones with an SS7 Vulnerability

What's interesting about this story is not that the cell phone system can track your location worldwide. That makes sense; the system has to know where you are....

Two New Snowden Stories
From Schneier on Security

Two New Snowden Stories

New Zealand is spying on its citizens. Edward Snowden weighs in personally. The NSA and GCHQ are mapping the entire Internet, including hacking into Deutsche Telekom...

Security of the SHA Family of Hash Functions
From Schneier on Security

Security of the SHA Family of Hash Functions

Good article on the insecurity of SHA-1 and the need to replace it sooner rather than later....

Friday Squid Blogging: 200-Pound Squid Found in Gulf of Mexico
From Schneier on Security

Friday Squid Blogging: 200-Pound Squid Found in Gulf of Mexico

A 200-pound dead giant squid was found near the coast of Matagorda, Texas. This is only the third giant squid ever found in the Gulf of Mexico. As usual, you can...

The Concerted Effort to Remove Data Collection Restrictions
From Schneier on Security

The Concerted Effort to Remove Data Collection Restrictions

Since the beginning, data privacy regulation focused on collection, storage, and use. You can see it in the OECD Privacy Framework from 1980 (see also this proposed...

Tabnapping: A New Phishing Attack
From Schneier on Security

Tabnapping: A New Phishing Attack

Aza Raskin describes a new phishing attack: taking over a background tab on a browser to trick people into entering in their login credentials. Clever....

WikiLeaks Spy Files
From Schneier on Security

WikiLeaks Spy Files

WikiLeaks has organized the trove of documents about corporations aiding government surveillance around the world. It's worth wandering around through all this...

Safeplug Security Analysis
From Schneier on Security

Safeplug Security Analysis

Good security analysis of Safeplug, which is basically Tor in a box. Short answer: not yet....

Wi-Fi Jammer
From Schneier on Security

Wi-Fi Jammer

A device called Cyborg Unplugged can be configured to prevent any Wi-Fi connection: Oliver notes on the product's website that its so-called "All Out Mode" -- which...

iPhone Payment Security
From Schneier on Security

iPhone Payment Security

Apple is including some sort of automatic credit-card payment system with the iPhone 6. They're using some security feature of the phone and system to negotiate...

Friday Squid Blogging: Book by One Squid-Obsessed Person About Another
From Schneier on Security

Friday Squid Blogging: Book by One Squid-Obsessed Person About Another

Preparing the Ghost: An Essay Concerning the Giant Squid and Its First Photographer, by Matthew Gavin Frank. As usual, you can also use this squid post to talk...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account