acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Attack Mitigation
From Schneier on Security

Attack Mitigation

At the RSA Conference this year, I noticed a trend of companies that have products and services designed to help victims recover from attacks. Kelly Jackson Higgins...

Biometric Passports Make it Harder for Undercover CIA Officers
From Schneier on Security

Biometric Passports Make it Harder for Undercover CIA Officers

Last year, I wrote about how social media sites are making it harder than ever for undercover police officers. This story talks about how biometric passports are...

Fear and the Attention Economy
From Schneier on Security

Fear and the Attention Economy

danah boyd is thinking about -- in a draft essay, and as a recording of a presentation -- fear and the attention economy. Basically, she is making the argument...

Amazing Round of "Split or Steal"
From Schneier on Security

Amazing Round of "Split or Steal"

In Liars and Outliers, I use the metaphor of the Prisoner's Dilemma to exemplify the conflict between group interest and self-interest. There are a gazillion academic...

Alan Turing Cryptanalysis Papers
From Schneier on Security

Alan Turing Cryptanalysis Papers

GCHQ, the UK government's communications headquarters, has released two new -- well, 70 years old, but new to us -- cryptanalysis documents by Alan Turing. The...

Friday Squid Blogging: Extracting Squid Ink
From Schneier on Security

Friday Squid Blogging: Extracting Squid Ink

How to extract squid ink. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

<i>Liars & Outliers</i> Update
From Schneier on Security

Liars & Outliers Update

Liars & Outliers has been available for about two months, and is selling well both in hardcover and e-book formats. More importantly, I'm very pleased with the...

TSA Behavioral Detection Statistics
From Schneier on Security

TSA Behavioral Detection Statistics

Interesting data from the U.S. Government Accounting Office: But congressional auditors have questions about other efficiencies as well, like having 3,000 "behavior...

Dance Moves As an Identifier
From Schneier on Security

Dance Moves As an Identifier

A burglar was identified by his dance moves, captured on security cameras: "The 16-year-old juvenile suspect is known for his 'swag,' or signature dance move,"...

Smart Meter Hacks
From Schneier on Security

Smart Meter Hacks

Brian Krebs writes about smart meter hacks: But it appears that some of these meters are smarter than others in their ability to deter hackers and block unauthorized...

Password Security at Linode
From Schneier on Security

Password Security at Linode

Here's something good: We have implemented sophisticated brute force protection for Linode Manager user accounts that combines a time delay on failed attempts,...

Stolen Phone Database
From Schneier on Security

Stolen Phone Database

This article talks about a database of stolen cell phone IDs that will be used to deny service. While I think this is a good idea, I don't know how much it would...

Forever-Day Bugs
From Schneier on Security

Forever-Day Bugs

That's a nice turn of phrase: Forever day is a play on "zero day," a phrase used to classify vulnerabilities that come under attack before the responsible manufacturer...

Outliers in Intelligence Analysis
From Schneier on Security

Outliers in Intelligence Analysis

From the CIA journal Studies in Intelligence: "Capturing the Potential of Outlier Ideas in the Intelligence Community." In war you will generally find that the...

Hawley Channels His Inner Schneier
From Schneier on Security

Hawley Channels His Inner Schneier

Kip Hawley wrote an essay for the Wall Street Journal on airport security. In it, he says so many sensible things that people have been forwarding it to me with...

How Information Warfare Changes Warfare
From Schneier on Security

How Information Warfare Changes Warfare

Really interesting paper on the moral and ethical implications of cyberwar, and the use of information technology in war (drones, for example): "Information Warfare...

Friday Squid Blogging: Squid Fiction
From Schneier on Security

Friday Squid Blogging: Squid Fiction

Great short story in Nature. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

Me at RSA 2012
From Schneier on Security

Me at RSA 2012

This is not a video of my talk at the RSA Conference earlier this year. This is a 16-minute version of that talk -- TED-like -- that the conference filmed the...

Disguising Tor Traffic as Skype Video Calls
From Schneier on Security

Disguising Tor Traffic as Skype Video Calls

One of the problems with Tor traffic is that it can de detected and blocked. Here's SkypeMorph, a clever system that disguises Tor traffic as Skype video traffic...

Bomb Threats As a Denial-of-Service Attack
From Schneier on Security

Bomb Threats As a Denial-of-Service Attack

The University of Pittsburgh has been the recipient of 50 bomb threats in the past two months (over 30 during the last week). Each time, the university evacuates...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account