acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

State-by-State Report on Electronic Voting
From Schneier on Security

State-by-State Report on Electronic Voting

The Verified Voting Foundation has released a comprehensive state-by-state report on electronic voting machines (report, executive summary, and news coverage)....

Friday Squid Blogging: SQUIDS and Quantum Computing
From Schneier on Security

Friday Squid Blogging: SQUIDS and Quantum Computing

It seems that quantum computers might use superconducting quantum interference devices (SQUIDs). As usual, you can also use this squid post to talk about the security...

Unsafe Safes
From Schneier on Security

Unsafe Safes

In a long article about insecurities in gun safes, there's this great paragraph: Unfortunately, manufacturers and consumers are deceived and misled into a false...

Overreaction and Overly Specific Reactions to Rare Risks
From Schneier on Security

Overreaction and Overly Specific Reactions to Rare Risks

Horrific events, such as the massacre in Aurora, can be catalysts for social and political change. Sometimes it seems that they're the only catalyst; recall how...

Court Orders TSA to Answer EPIC
From Schneier on Security

Court Orders TSA to Answer EPIC

Year ago, EPIC sued the TSA over full body scanners (I was one of the plantiffs), demanding that they follow their own rules and ask for public comment. The court...

Hotel Door Lock Vulnerability
From Schneier on Security

Hotel Door Lock Vulnerability

The attack only works sometimes, but it does allow access to millions of hotel rooms worldwide that are secured by Onity brand locks. Basically, you can read the...

Profile on Eugene Kaspersky
From Schneier on Security

Profile on Eugene Kaspersky

Wired has an interesting and comprehensive profile on Eugene Kaspersky. Especially note Kaspersky Lab's work to uncover US cyberespionage against Iran, Kaspersky's...

Lone Shooters and Body Armor
From Schneier on Security

Lone Shooters and Body Armor

The new thing about the Aurora shooting wasn't the weaponry, but the armor: What distinguished Holmes wasn't his offense. It was his defense. At Columbine, Harris...

On Soft Targets
From Schneier on Security

On Soft Targets

Stratfor has an interesting article.

Fake Irises Fool Scanners
From Schneier on Security

Fake Irises Fool Scanners

We already know you can wear fake irises to fool a scanner into thinking you're not you, but this is the first fake iris you can use for impersonation: to fool...

Hacking Tool Disguised as a Power Strip
From Schneier on Security

Hacking Tool Disguised as a Power Strip

This is impressive: The device has Bluetooth and Wi-Fi adapters, a cellular connection, dual Ethernet ports, and hacking and remote access tools that let security...

Fear-Mongering at TED
From Schneier on Security

Fear-Mongering at TED

This TED talk trots out the usual fear-mongering that technology leads to terrorism. The facts are basically correct, but there are no counterbalancing facts,...

Detroit Bomb Threats
From Schneier on Security

Detroit Bomb Threats

There have been a few hoax bomb threats in Detroit recently (Windsor tunnel, US-Canada bridge, Tiger Stadium). The good news is that police learned; during the...

Friday Squid Blogging: Tentacle Doorstop
From Schneier on Security

Friday Squid Blogging: Tentacle Doorstop

Now this is neat. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

<i>Liars and Outliers</i> Summed Up in Two Comic Strips
From Schneier on Security

Liars and Outliers Summed Up in Two Comic Strips

I don't know the context, but these strips sum up my latest book nicely.

Criminals Using Commercial Spamflooding Services
From Schneier on Security

Criminals Using Commercial Spamflooding Services

Cybercriminals are using commercial spamflooding services to distract their victims during key moments of a cyberattack. Clever, but in retrospect kind of obvious...

Police Sting Operation Yields No Mobile Phone Thefts
From Schneier on Security

Police Sting Operation Yields No Mobile Phone Thefts

Police in Hastings, in the UK, outfitted mobile phones with tracking devices and left them in bars and restaurants, hoping to catch mobile phone thieves in thestole...

Making Handcuff Keys with 3D Printers
From Schneier on Security

Making Handcuff Keys with 3D Printers

Handcuffs pose a particular key management problem. Officers need to be able to unlock handcuffs locked by another officer, so they're all designed to be opened...

Implicit Passwords
From Schneier on Security

Implicit Passwords

This is a really interesting research paper (article here) on implicit passwords: something your unconscious mind remembers but your conscious mind doesn't know...

How the Norwegians Reacted to Terrorism
From Schneier on Security

How the Norwegians Reacted to Terrorism

An antidote to the American cycle of threat, fear, and overspending in response to terrorism is this, about Norway on the first anniversary of its terrorist massacre...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account