acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Terms of Service as a Security Threat
From Schneier on Security

Terms of Service as a Security Threat

After the Instagram debacle, where it changed its terms of service to give itself greater rights over user photos and reversed itself after a user backlash, it's...

Friday Squid Blogging: William Gilly, Squid Researcher
From Schneier on Security

Friday Squid Blogging: William Gilly, Squid Researcher

Good article. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

I Seem to Be a Verb
From Schneier on Security

I Seem to Be a Verb

From "The Insider's TSA Dictionary": Bruce Schneiered: (V, ints) When a passenger uses logic in order to confound and perplex an officer into submission. Ex: "A...

Becoming a Police Informant in Exchange for a Lighter Sentence
From Schneier on Security

Becoming a Police Informant in Exchange for a Lighter Sentence

Fascinating article. Snitching has become so commonplace that in the past five years at least 48,895 federal convicts -- one of every eight -- had their prison...

Breaking Hard-Disk Encryption
From Schneier on Security

Breaking Hard-Disk Encryption

The newly announced ElcomSoft Forensic Disk Decryptor can decrypt BitLocker, PGP, and TrueCrypt. And it's only $300. How does it work? Elcomsoft Forensic Disk...

Public Shaming as a Security Measure
From Schneier on Security

Public Shaming as a Security Measure

In Liars and Outliers, I talk a lot about the more social forms of security. One of them is reputational. This post is about that squishy sociological security...

<i>Cryptography Engineering</i> Available as an eBook
From Schneier on Security

Cryptography Engineering Available as an eBook

Finally, Cryptography Engineering is available as an ebook. Even better, it's today's deal of the day at O'Reilly: $27.50 (50% off) and no copy protection. (The...

Hackers Use Backdoor to Break System
From Schneier on Security

Hackers Use Backdoor to Break System

Industrial control system comes with a backdoor: Although the system was password protected in general, the backdoor through the IP address apparently required...

Peruvian Spider Species Creates Decoys
From Schneier on Security

Peruvian Spider Species Creates Decoys

Clyclosa spiders create decoys to fool predators.

Phishing via Twitter
From Schneier on Security

Phishing via Twitter

Interesting firsthand phishing story: A few nights ago, I got a Twitter direct message (DM) from a friend saying that someone was saying nasty things about me,...

Friday Squid Blogging: Laughing Squid
From Schneier on Security

Friday Squid Blogging: Laughing Squid

The small San Francisco film and video company is celebrating its 17th anniversary. As usual, you can also use this squid post to talk about the security stories...

This Week's Overreactions
From Schneier on Security

This Week's Overreactions

Schools go into lockdown over a thermometer, a car backfiring, a bank robbery a few blocks away, a student alone in a gym, a neighbor on the street, and some vague...

Amazon Replacement-Order Scam
From Schneier on Security

Amazon Replacement-Order Scam

Clever: Chris Cardinal discovered someone running such a scam on Amazon using his account: the scammer contacted Amazon pretending to be Chris, supplying his billing...

China Now Blocking Encryption
From Schneier on Security

China Now Blocking Encryption

The "Great Firewall of China" is now able to detect and block encryption: A number of companies providing "virtual private network" (VPN) services to users in...

Information-Age Law Enforcement Techniques
From Schneier on Security

Information-Age Law Enforcement Techniques

This is an interesting blog post: Buried inside a recent United Nations Office on Drugs and Crime report titled Use of Internet for Terrorist Purposes one canHere's...

Nasty Samsung Phone Exploit
From Schneier on Security

Nasty Samsung Phone Exploit

There's a new exploit against Samsung Galaxy phones that allows a rogue app access to all memory. A hacker could copy all of your data, erase all of your data,...

Possible Decryption of World War II Pigeon Message
From Schneier on Security

Possible Decryption of World War II Pigeon Message

A Canadian claims that the message is based on a WWI codebook. A spokesman from GCHQ remains dubious, but says they'll be happy to look at the proposed solution...

Friday Squid Blogging: Giant PVC Squid
From Schneier on Security

Friday Squid Blogging: Giant PVC Squid

Neat art project. Another link. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

Book Review: <i>Against Security</i>
From Schneier on Security

Book Review: Against Security

Against Security: How We Go Wrong at Airports, Subways, and Other Sites of Ambiguous Danger, by Harvey Molotch, Princeton University Press, 278 pages, $35 Security...

The History of Security Economics
From Schneier on Security

The History of Security Economics

Ross Anderson recalls the history of security economics (presentation and paper.)
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account