acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

The <i>Onion</i> on Browser Security
From Schneier on Security

The Onion on Browser Security

Wise advice: At Chase Bank, we recognize the value of online banking­ -- it’s quick, convenient, and available any time you need it. Unfortunately, though, the...

Mail Cover
From Schneier on Security

Mail Cover

From a FOIAed Department of Transportation document on investigative techniques: A "mail cover" is the process by which the U.S. Postal Service records any data...

The <i>Economist</i> on Guantanamo
From Schneier on Security

The Economist on Guantanamo

Maybe the tide is turning: America is in a hole. The last response of the blowhards and cowards who have put it there is always: "So what would you do: set them...

Reidentifying Anonymous Data
From Schneier on Security

Reidentifying Anonymous Data

Latanya Sweeney has demonstrated how easy it can be to identify people from their birth date, gender, and zip code. The anonymous data she reidentified happened...

Evacuation Alerts at the Airport
From Schneier on Security

Evacuation Alerts at the Airport

Last week, an employee error caused the monitors at LAX to display a building evacuation order: At a little before 9:47 p.m., the message read: "An emergency has...

Is the U.S. Government Recording and Saving All Domestic Telephone Calls?
From Schneier on Security

Is the U.S. Government Recording and Saving All Domestic Telephone Calls?

I have no idea if "former counterterrorism agent for the FBI" Tom Clemente knows what he's talking about, but that's certainly what he implies here: More recently...

Intelligence Analysis and the Connect-the-Dots Metaphor
From Schneier on Security

Intelligence Analysis and the Connect-the-Dots Metaphor

The FBI and the CIA are being criticized for not keeping better track of Tamerlan Tsarnaev in the months before the Boston Marathon bombings. How could they have...

Michael Chertoff on Google Glass
From Schneier on Security

Michael Chertoff on Google Glass

Interesting op-ed by former DHS head Michael Chertoff on the privacy risks of Google Glass. Now imagine that millions of Americans walk around each day wearing...

Honeywords
From Schneier on Security

Honeywords

Here is a simple but clever idea. Seed password files with dummy entries that will trigger an alarm when used. That way a site can know when a hacker is trying...

Friday Squid Blogging: Squid Escape Artist
From Schneier on Security

Friday Squid Blogging: Squid Escape Artist

It's amazing how small a hole he can fit through. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered...

Another WWII Message Decoded
From Schneier on Security

Another WWII Message Decoded

It's a really interesting code and story. (The first link has the most detailed information about the code and the cryptanalysis.)

The Public/Private Surveillance Partnership
From Schneier on Security

The Public/Private Surveillance Partnership

Our government collects a lot of information about us. Tax records, legal records, license records, records of government services received-- it's all in databases...

Risks of Networked Systems
From Schneier on Security

Risks of Networked Systems

Interesting research: Helbing's publication illustrates how cascade effects and complex dynamics amplify the vulnerability of networked systems. For example, just...

More on FinSpy/FinFisher
From Schneier on Security

More on FinSpy/FinFisher

FinFisher (also called FinSpy) is a commercially sold spyware package that is used by governments world-wide, including the U.S. There's a new report that hasbunch...

Google Pays $31,000 for Three Chrome Vulnerabilities
From Schneier on Security

Google Pays $31,000 for Three Chrome Vulnerabilities

Google is paying bug bounties. This is important; there's a market in vulnerabilities that provides incentives for their being kept secret and exploitable; for...

Details of a Cyberheist
From Schneier on Security

Details of a Cyberheist

Really interesting article detailing how criminals steal from a company's accounts over the Internet. The costly cyberheist was carried out with the help of nearly...

The Importance of Backups
From Schneier on Security

The Importance of Backups

I've already written about the guy who got a new trial because a virus ate his court records. Here's someone who will have to redo his thesis research because...

Pinging the Entire Internet
From Schneier on Security

Pinging the Entire Internet

Turns out there's a lot of vulnerable systems out there: Many of the two terabytes (2,000 gigabytes) worth of replies Moore received from 310 million IPs indicated...

More Links on the Boston Terrorist Attacks
From Schneier on Security

More Links on the Boston Terrorist Attacks

Max Abrahms has two sensible essays. Probably the ultimate in security theater: Williams-Sonoma stops selling pressure cookers "out of respect." They say it's...

Friday Squid Blogging: Lego Giant Squid Model
From Schneier on Security

Friday Squid Blogging: Lego Giant Squid Model

This is a fantastic Lego model of a space kraken attacking a Star Wars Super Star Destroyer. As usual, you can also use this squid post to talk about the security...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account