acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

19th-Century Traffic Analysis
From Schneier on Security

19th-Century Traffic Analysis

There's a nice example of traffic analysis in the book No Name, by Wilkie Collins (1862). The attacker, Captain Wragge, needs to know whether a letter has been...

Hacking Citation Counts
From Schneier on Security

Hacking Citation Counts

Hacking citation counts using Google Scholar.

More State-Sponsored Hacking
From Schneier on Security

More State-Sponsored Hacking

After the New York Times broke the story of what seemed to be a state-sponsored hack from China against the newspaper, the Register has stories of two similar attacks...

Automobile Data Surveillance and the Future of Black Boxes
From Schneier on Security

Automobile Data Surveillance and the Future of Black Boxes

Tesla Motors gave one of its electric cars to John Broder, a very outspoken electric-car skeptic from the New York Times, for a test drive. After a negative review...

Friday Squid Blogging: More on Flying Squid
From Schneier on Security

Friday Squid Blogging: More on Flying Squid

Japanese squid researchers have confirmed flying squid can fly, and how they do it. (Note: I have written about flying squid before.) As usual, you can also use...

Jacob Appelbaum's 29C3 Keynote Speech
From Schneier on Security

Jacob Appelbaum's 29C3 Keynote Speech

This speech from last December's 29C3 (29th Chaos Communication Congress) is worth listening to. He talks about what we can do in the face of oppressive power...

Guessing Smart Phone PINs by Monitoring the Accelerometer
From Schneier on Security

Guessing Smart Phone PINs by Monitoring the Accelerometer

"Practicality of Accelerometer Side Channels on Smartphones," by Adam J. Aviv. Benjamin Sapp, Matt Blaze, and Jonathan M. Smith. Abstract: Modern smartphonesArticle...

Using the iWatch for Authentication
From Schneier on Security

Using the iWatch for Authentication

Usability engineer Bruce Tognazzini talks about how an iWatch -- which seems to be either a mythical Apple product or one actually in development -- can make authentication...

Anti-Cheating Security in Casinos
From Schneier on Security

Anti-Cheating Security in Casinos

Long article. With over a thousand cameras operating 24/7, the monitoring room creates tremendous amounts of data every day, most of which goes unseen. Six technicians...

Real-World Prisoner's Dilemma from France
From Schneier on Security

Real-World Prisoner's Dilemma from France

This is a real story of a pair of identical twins who are suspected in a crime. There is there is CCTV and DNA evidence that could implicate either suspect. Detailed...

New al Qaeda Encryption Tool
From Schneier on Security

New al Qaeda Encryption Tool

There's not a lot of information -- and quite a lot of hyperbole -- in this article: With the release of the Asrar Al Dardashah plugin, GIMF promised "secure correspondence"...

Massive Police Shootout in Cleveland Despite Lack of Criminals
From Schneier on Security

Massive Police Shootout in Cleveland Despite Lack of Criminals

This is an amazing story. I urge you to read the whole thing, but here's the basics: A November car chase ended in a "full blown-out" firefight, with glass and...

Our New Regimes of Trust
From Schneier on Security

Our New Regimes of Trust

Society runs on trust. Over the millennia, we've developed a variety of mechanisms to induce trustworthy behavior in society. These range from a sense of guiltThis...

Really Clever TLS Attack
From Schneier on Security

Really Clever TLS Attack

This is an extremely clever man-in-the-middle timing attack against AES that exploits the interaction between how the protocol implements AES in CBC mode for encryption...

Platform Fragmentation as a Security Issue
From Schneier on Security

Platform Fragmentation as a Security Issue

Interesting article about the difficulty Google has pushing security updates onto Android phones. The problem is that the phone manufacturer is in charge, and...

Friday Squid Blogging: Squid Recipe
From Schneier on Security

Friday Squid Blogging: Squid Recipe

Chorizo-stuffed squid with potatoes, capers and sage. As usual, you can also use this squid post to talk about the security stories in the news that I haven't...

I Seem to Be a Physical Security Expert Now
From Schneier on Security

I Seem to Be a Physical Security Expert Now

This seems so obviously written by someone who Googled me on the Internet, without any other knowledge of who I am or what i do.

Millennials and Cybersecurity
From Schneier on Security

Millennials and Cybersecurity

This long report looks at risky online behavior among the Millennial generation, and finds that they respond positively to automatic reminders and prodding. No...

Inauguration Security
From Schneier on Security

Inauguration Security

A first-person account of the security surrounding the second inauguration of President Obama.

Tide Becomes Drug Currency
From Schneier on Security

Tide Becomes Drug Currency

Basically, Tide detergent is a popular product with a very small profit margin. So small non-chain grocery and convenience stores are happy to buy it cheaply,started...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account