acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Switzerland National Defense
From Schneier on Security

Switzerland National Defense

Interesting blog post about this book about Switzerland's national defense. To make a long story short, McPhee describes two things: how Switzerland requires military...

Attack Against Point-of-Sale Terminal
From Schneier on Security

Attack Against Point-of-Sale Terminal

Clever attack: When you pay a restaurant bill at your table using a point-of-sale machine, are you sure it's legit? In the past three months, Toronto and Peel...

The Failure of Anti-Virus Companies to Catch Military Malware
From Schneier on Security

The Failure of Anti-Virus Companies to Catch Military Malware

Mikko Hyponnen of F-Secure attempts to explain why anti-virus companies didn't catch Stuxnet, DuQu, and Flame: When we went digging through our archive for related...

England's Prince Phillip on Security
From Schneier on Security

England's Prince Phillip on Security

On banning guns: "If a cricketer, for instance, suddenly decided to go into a school and batter a lot of people to death with a cricket bat,which he could do very...

Honor System Farm Stands
From Schneier on Security

Honor System Farm Stands

Many roadside farm stands in the U.S. are unmanned. They work on the honor system: take what you want, and pay what you owe. And today at his farm stand, Cochran...

Friday Squid Blogging: Woman's Mouth Inseminated by Cooked Squid
From Schneier on Security

Friday Squid Blogging: Woman's Mouth Inseminated by Cooked Squid

This story is so freaky I'm not even sure I want to post it. But if I don't, you'll all send me the links. As usual, you can also use this squid post to talk...

FireDogLake Book Salon for <i>Liars and Outliers</i>
From Schneier on Security

FireDogLake Book Salon for Liars and Outliers

On Sunday, I will be participating in a public discussion about my new book on the FireDogLake website. James Fallows will be the moderator, and I will be answering...

Rare Rational Comment on al Qaeda's Capabilities
From Schneier on Security

Rare Rational Comment on al Qaeda's Capabilities

From "CNN national security analyst" Peter Bergen: Few Americans harbor irrational fears about being killed by a lightning bolt. Abu Yahya al-Libi's death on Monday...

Cheating in Online Classes
From Schneier on Security

Cheating in Online Classes

Interesting article: In the case of that student, the professor in the course had tried to prevent cheating by using a testing system that pulled questions at...

Cyberwar Treaties
From Schneier on Security

Cyberwar Treaties

We're in the early years of a cyberwar arms race. It's expensive, it's destabilizing, and it threatens the very fabric of the Internet we use every day. Cyberwar...

Teaching the Security Mindset
From Schneier on Security

Teaching the Security Mindset

In 2008 I wrote about the security mindset and how difficult it is to teach. Two professors teaching a cyberwarfare class gave an exam where they expected their...

High-Quality Fake IDs from China
From Schneier on Security

High-Quality Fake IDs from China

USA Today article: Most troubling to authorities is the sophistication of the forgeries: Digital holograms are replicated, PVC plastic identical to that found...

Israel Demanding Passwords at the Border
From Schneier on Security

Israel Demanding Passwords at the Border

There have been a bunch of stories about employers demanding passwords to social networking sites, like Facebook, from prospective employees, and several states...

Changing Surveillance Techniques for Changed Communications Technologies
From Schneier on Security

Changing Surveillance Techniques for Changed Communications Technologies

New paper by Peter P. Swire -- "From Real-Time Intercepts to Stored Records: Why Encryption Drives the Government to Seek Access to the Cloud": Abstract: This...

Friday Squid Blogging: Baby Opalescent Squid
From Schneier on Security

Friday Squid Blogging: Baby Opalescent Squid

Baby squid larvae are transparent after they hatch, so you can see the chromataphores (color control mechanisms) developing after a few days. As usual, you can...

The Catastrophic Consequences of 9/11
From Schneier on Security

The Catastrophic Consequences of 9/11

This is an interesting essay -- it claims to be the first in a series -- that looks at the rise of "homeland security" as a catastrophic consequence of the 9/11...

Homeland Security as Security Theater Metaphor
From Schneier on Security

Homeland Security as Security Theater Metaphor

Look at the last sentence in this article on hotel cleanliness: "I relate this to homeland security. We are not any safer, but many people believe that we are,"...

Ghostery
From Schneier on Security

Ghostery

Ghostery is a Firefox plug-in that tracks who is tracking your browsing habits in cyberspace. Here's a TED talk by Gary Kovacs, the CEO of Mozilla Corp., on it...

Security and Human Behavior (SHB 2012)
From Schneier on Security

Security and Human Behavior (SHB 2012)

I'm at the Fifth Interdisciplinary Workshop on Security and Human Behavior, SHB 2012. Google is hosting this year, at its offices in lower Manhattan. SHB is an...

Interesting Article on Libyan Internet Intelligence Gathering
From Schneier on Security

Interesting Article on Libyan Internet Intelligence Gathering

This is worth reading, for the insights it provides on how a country goes about monitoring its citizens in the information age: a combination of targeted attacks...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account