acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

The Nemim.gen Trojan
From Schneier on Security

The Nemim.gen Trojan

This clever piece of malware evades forensic examination by deleting its own components.

Initial Thoughts on the Boston Bombings
From Schneier on Security

Initial Thoughts on the Boston Bombings

I rewrote my "refuse to be terrorized" essay for the Atlantic. David Rothkoph (author of the great book Power, Inc.) wrote something similar, and so did John Cole...

FBI and Cell Phone Surveillance
From Schneier on Security

FBI and Cell Phone Surveillance

We're learning a lot about how the FBI eavesdrops on cell phones from a recent court battle.

Google Glass Enables New Forms of Cheating
From Schneier on Security

Google Glass Enables New Forms of Cheating

It's mentioned here: Mr. Doerr said he had been wearing the glasses and uses them especially for taking pictures and looking up words while playing Scattergories...

Friday Squid Blogging: Illegal Squid Fishing
From Schneier on Security

Friday Squid Blogging: Illegal Squid Fishing

While we we're on the subject of squid fishing in Argentina, the country is dealing with foreign boats illegally fishing for squid inside its territorial waters...

Remotely Hijacking an Aircraft
From Schneier on Security

Remotely Hijacking an Aircraft

There is a lot of buzz on the the Internet about a talk at the Hack-in-the Box conference by Hugo Teso, who claims he can hack in to remotely control an airplane's...

Thieves Use Video Camera to Stake Out Properties
From Schneier on Security

Thieves Use Video Camera to Stake Out Properties

If the police can use cameras, so can the burglars.

Security Externalities and DDOS Attacks
From Schneier on Security

Security Externalities and DDOS Attacks

Ed Felten has a really good blog post about the externalities that the recent Spamhaus DDOS attack exploited: The attackers' goal was to flood Spamhaus or itswriting...

Last Battle of Midway Cryptanalyst
From Schneier on Security

Last Battle of Midway Cryptanalyst

The last cryptanalyst at the Battle of Midway, Rear Admiral Donald "Mac" Showers, USN-Ret, passed away 19 October 2012. His interment at Arlington National Cemetery...

Nice Security Mindset Example
From Schneier on Security

Nice Security Mindset Example

A real-world one-way function: Alice and Bob procure the same edition of the white pages book for a particular town, say Cambridge. For each letter Alice wants...

Bitcoins in the Mainstream Media
From Schneier on Security

Bitcoins in the Mainstream Media

Interesting article from the New Yorker. I'm often asked what I think about bitcoins. I haven't analyzed the security, but what I have seen looks good. The real...

Elite Panic
From Schneier on Security

Elite Panic

I hadn't heard of this term before, but it's an interesting one. The excerpt below is from an interview with Rebecca Solnit, author of A Paradise Built in Hell...

Government Use of Hackers as an Object of Fear
From Schneier on Security

Government Use of Hackers as an Object of Fear

Interesting article about the perception of hackers in popular culture, and how the government uses the general fear of them to push for more power: But theseoverzealous...

Friday Squid Blogging: Nighttime Squid Fishing Seen from Space
From Schneier on Security

Friday Squid Blogging: Nighttime Squid Fishing Seen from Space

Page 18 of this thesis explains that squid fishing is done at night, and the lighting is so bright shows up in the satellite surveys of planetary lighting. This...

Apple's iMessage Encryption Seems to Be Pretty Good
From Schneier on Security

Apple's iMessage Encryption Seems to Be Pretty Good

The U.S. Drug Enforcement Agency has complained (in a classified report, not publicly) that Apple's iMessage end-to-end encryption scheme can't be broken. On the...

Skein Collision Competition
From Schneier on Security

Skein Collision Competition

Xkcd had a Skein collision competition. The contest is over -- Carnegie Mellon University won, with 384 (out of 1024) mismatched bits -- but it's explained here...

NSA Crossword Puzzles
From Schneier on Security

NSA Crossword Puzzles

Two puzzles from a 1977 issue of Cryptolog.

IT for Oppression
From Schneier on Security

IT for Oppression

Whether it's Syria using Facebook to help identify and arrest dissidents or China using its "Great Firewall" to limit access to international news throughout the...

Narratives of Secrecy
From Schneier on Security

Narratives of Secrecy

How people talked about the secrecy surrounding the Manhattan project.

Sixth Movie-Plot Threat Contest
From Schneier on Security

Sixth Movie-Plot Threat Contest

It's back, after a two-year hiatus. Terrorism is boring; cyberwar is in. Cyberwar, and its kin: cyber Pearl Harbor, cyber 9/11, cyber Armageddon. (Or make up...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account