acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Camera-Transparent Plastic
From Schneier on Security

Camera-Transparent Plastic

I just wrote about the coming age of invisible surveillance. Here's another step along that process. The material is black in color and cannot be seen through...

Chinese Airline Rewards Crew for Resisting Hijackers
From Schneier on Security

Chinese Airline Rewards Crew for Resisting Hijackers

Normally, companies instruct their employees not to resist. But Hainan Airlines did the opposite: Two safety officers and the chief purser got cash and property...

Remote Scanning Technology
From Schneier on Security

Remote Scanning Technology

I don't know if this is real or fantasy: Within the next year or two, the U.S. Department of Homeland Security will instantly know everything about your body,remote...

Friday Squid Blogging: Barbecued Squid -- New Summer Favorite
From Schneier on Security

Friday Squid Blogging: Barbecued Squid -- New Summer Favorite

In the UK, barbecued squid is in: Sales of squid have tripled in recent months due to the growing popularity of Mediterranean food and the rise of the Dukan diet...

Hacking BMW's Remote Keyless Entry System
From Schneier on Security

Hacking BMW's Remote Keyless Entry System

It turns out to be surprisingingly easy: The owner, who posted the video at 1addicts.com, suspects the thieves broke the glass to access the BMW's on-board diagnostics...

All-or-Nothing Access Control for Mobile Phones
From Schneier on Security

All-or-Nothing Access Control for Mobile Phones

This paper looks at access control for mobile phones. Basically, it's all or nothing: either you have a password that protects everything, or you have no password...

Dropped USB Sticks in Parking Lot as Actual Attack Vector
From Schneier on Security

Dropped USB Sticks in Parking Lot as Actual Attack Vector

For years, it's been a clever trick to drop USB sticks in parking lots of unsuspecting businesses, and track how many people plug them into computers. I have long...

Petition the U.S. Government to Force the TSA to Follow the Law
From Schneier on Security

Petition the U.S. Government to Force the TSA to Follow the Law

This is important: In July 2011, a federal appeals court ruled that the Transportation Security Administration had to conduct a notice-and-comment rulemaking on...

Cryptanalyze the Agrippa Code
From Schneier on Security

Cryptanalyze the Agrippa Code

William Gibson's Grippa Code is available for cryptanalysis. Break the code, win a prize.

Attacking Fences
From Schneier on Security

Attacking Fences

From an article on the cocaine trade between Mexico and the U.S.: "They erect this fence," he said, "only to go out there a few days later and discover that these...

Sensible Comments about Terrorism
From Schneier on Security

Sensible Comments about Terrorism

Two, at least: "Bee stings killed as many in UK as terrorists, says watchdog." "Americans Are as Likely to Be Killed by Their Own Furniture as by Terrorism." Is...

Students Hack DHS Drone
From Schneier on Security

Students Hack DHS Drone

A team at the University of Texas successfully spoofed the GPS and took control of a DHS drone, for about $1,000 in off-the-shelf parts. Does anyone think that...

Friday Squid Blogging: Dissecting a Squid
From Schneier on Security

Friday Squid Blogging: Dissecting a Squid

This was suprisingly interesting. When a body is mysterious, you cut it open. You peel back the skin and take stock of its guts. It is the science of an arrow,...

Me on Military Cyberattacks and Cyberweapons Treaties
From Schneier on Security

Me on Military Cyberattacks and Cyberweapons Treaties

I did a short Q&A for Network World.

Naming Pets
From Schneier on Security

Naming Pets

Children are being warned that the name of their first pet should contain at least eight characters and a digit.

So You Want to Be a Security Expert
From Schneier on Security

So You Want to Be a Security Expert

I regularly receive e-mail from people who want advice on how to learn more about computer security, either as a course of study in college or as an IT person considering...

Commercial Espionage Virus
From Schneier on Security

Commercial Espionage Virus

It's designed to steal blueprints and send them to China. Note that although this is circumstantial evidence that the virus is from China, it is possible that...

On Fear
From Schneier on Security

On Fear

A poet reflects on the nature of fear.

WEIS 2012
From Schneier on Security

WEIS 2012

Last week I was at the Workshop on Economics and Information Security in Berlin. Excellent conference, as always. Ross Anderson liveblogged the event; see the...

Friday Squid Blogging: Another Giant Squid Found
From Schneier on Security

Friday Squid Blogging: Another Giant Squid Found

A dead 13-foot-long giant squid has been found off the coast of New South Wales. As usual, you can also use this squid post to talk about the security stories...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account