acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Building Retro Reflectors
From Schneier on Security

Building Retro Reflectors

A group of researchers have reverse-engineered the NSA's retro reflectors, and has recreated them using software-defined radio (SDR): An SDR Ossmann designed and...

Friday Squid Blogging: Ruth Reichl Cooks Squid
From Schneier on Security

Friday Squid Blogging: Ruth Reichl Cooks Squid

Quick and easy recipe. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Co3 Systems Is Hiring
From Schneier on Security

Co3 Systems Is Hiring

At the beginning of the year, I announced that I'd joined Co3 Systems as its CTO. Co3 Systems makes coordination software -- what I hear called workflow management...

More Details on NSA Tapping the Internet Backbone
From Schneier on Security

More Details on NSA Tapping the Internet Backbone

Two new stories: one from Der Spiegel in Germany (also reported in the Intercept) and the other from Dagbladet in Denmark (again, also reported in the Intercept)...

Paying People to Infect their Computers
From Schneier on Security

Paying People to Infect their Computers

Research paper: "It’s All About The Benjamins: An empirical study on incentivizing users to ignore security advice, by Nicolas Christin, Serge Egelman, Timothy...

The Democratization of Surveillance
From Schneier on Security

The Democratization of Surveillance

MarketWatch has a list of five apps for spying on your spouse....

Story of a $10 Million Remote Scam
From Schneier on Security

Story of a $10 Million Remote Scam

This is a bizarre story of an almost-happened $10 million scam. It reads like an obviously phony Nigerian 419 scam, but it actually fooled what seem to be smart...

Use of Social Media by ISIS
From Schneier on Security

Use of Social Media by ISIS

Here are two articles about how effectively the Islamic State of Iraq and Syria (ISIS) -- the militant group that has just taken over half of Iraq -- is using social...

The State of Cyberinsurance
From Schneier on Security

The State of Cyberinsurance

Good essay on the current state of cyberinsurance. So where does that leave the growing cyber insurance industry as it tries to figure out what losses it should...

Falsifying Evidence on a Smart Phone
From Schneier on Security

Falsifying Evidence on a Smart Phone

Here's a way to plant false evidence -- call records, locations, etc -- on your smart phone. I have no idea how good this will be. Presumably it will be an arms...

Friday Squid Blogging: Antibiotic-Resistant Bacteria Found in Canadian Squid
From Schneier on Security

Friday Squid Blogging: Antibiotic-Resistant Bacteria Found in Canadian Squid

This is not good news. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

"Erotica Written By Someone With An Appropriate Sense of Privacy"
From Schneier on Security

"Erotica Written By Someone With An Appropriate Sense of Privacy"

Funny....

Seventh Movie-Plot Threat Contest Winner
From Schneier on Security

Seventh Movie-Plot Threat Contest Winner

On April 1, I announced the Seventh Mostly Annual Movie-Plot Threat Contest: The NSA has won, but how did it do it? How did it use its ability to conduct ubiquitous...

Censorship in China
From Schneier on Security

Censorship in China

First-person experience of censorship in China....

Feedly Victim of DDOS Blackmail
From Schneier on Security

Feedly Victim of DDOS Blackmail

So far they're resisting. Evernote and Deezer are also suffering attacks. I haven't seen anything linking the three different victims, and the other two have not...

iOS 8 is Randomizing MAC Addresses
From Schneier on Security

iOS 8 is Randomizing MAC Addresses

This seems like a good idea....

Security Risks from Remote Controlled Smart Devices
From Schneier on Security

Security Risks from Remote Controlled Smart Devices

We're starting to see a proliferation of smart devices that can be controlled from your phone. The security risk is, of course, that anyone can control them from...

Security and Human Behavior (SHB 2014)
From Schneier on Security

Security and Human Behavior (SHB 2014)

I'm at SHB 2014: the Seventh Annual Interdisciplinary Workshop on Security and Human Behavior. This is a small invitational gathering of people studying various...

Friday Squid Blogging: Squid Cartoon
From Schneier on Security

Friday Squid Blogging: Squid Cartoon

Rhymes with Orange. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

GCHQ Intercept Sites in Oman
From Schneier on Security

GCHQ Intercept Sites in Oman

Last June, the Guardian published a story about GCHQ tapping fiber-optic Internet cables around the globe, part of a program codenamed TEMPURA. One of the facts...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account