acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Bomb Threats As a Denial-of-Service Attack
From Schneier on Security

Bomb Threats As a Denial-of-Service Attack

The University of Pittsburgh has been the recipient of 50 bomb threats in the past two months (over 30 during the last week). Each time, the university evacuates...

Brian Snow on Cybersecurity
From Schneier on Security

Brian Snow on Cybersecurity

Interesting video of Brian Snow speaking from last November. (Brian used to be the Technical Director of NSA's Information Assurance Directorate.) About a year...

"Raise the Crime Rate"
From Schneier on Security

"Raise the Crime Rate"

I read this a couple of months ago, and I'm still not sure what I think about it. It's definitely of the most thought-provoking essays I've read this year. According...

A Heathrow Airport Story about Trousers
From Schneier on Security

A Heathrow Airport Story about Trousers

Usually I don't bother posting random stories about dumb or inconsistent airport security measures. But this one is particularly interesting: "Sir, your trousers...

Teenagers and Privacy
From Schneier on Security

Teenagers and Privacy

Good article debunking the myth that young people don't care about privacy on the Intenet. Most kids are well aware of risks, and make "fairly sophisticated" decisions...

Laptops and the TSA
From Schneier on Security

Laptops and the TSA

The New York Times tries to make sense of the TSA's policies on computers. Why do you have to take your tiny laptop out of your bag, but not your iPad? Their...

Friday Squid Blogging: Squid Art
From Schneier on Security

Friday Squid Blogging: Squid Art

Happy Easter. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

A Systems Framework for Catastrophic Disaster Response
From Schneier on Security

A Systems Framework for Catastrophic Disaster Response

The National Academies Press has published Crisis Standards of Care: A Systems Framework for Catastrophic Disaster Response. When a nation or region prepares...

James Randi on Magicians and the Security Mindset
From Schneier on Security

James Randi on Magicians and the Security Mindset

Okay, so he doesn't use that term. But he explains how a magician's inherent ability to detect deception can be useful to science. We can't make magicians out...

Helen Nussenbaum, Privacy, and the Federal Trade Commission
From Schneier on Security

Helen Nussenbaum, Privacy, and the Federal Trade Commission

Good article.

JetBlue Captain Clayton Osbon and Resilient Security
From Schneier on Security

JetBlue Captain Clayton Osbon and Resilient Security

This is the most intelligent thing I've read about the JetBlue incident where a pilot had a mental breakdown in the cockpit: For decades, public safety officials...

The Battle for Internet Governance
From Schneier on Security

The Battle for Internet Governance

Good article on the current battle for Internet governance: The War for the Internet was inevitable -- a time bomb built into its creation. The war grows out of...

Lost Smart Phones and Human Nature
From Schneier on Security

Lost Smart Phones and Human Nature

Symantec deliberately "lost" a bunch of smart phones with tracking software on them, just to see what would happen: Some 43 percent of finders clicked on an app...

Law Enforcement Forensics Tools Against Smart Phones
From Schneier on Security

Law Enforcement Forensics Tools Against Smart Phones

Turns out the password can be easily bypassed: XRY works by first jailbreaking the handset. According to Micro Systemation, no

Computer Forensics: An Example
From Schneier on Security

Computer Forensics: An Example

Paul Ceglia's lawsuit against Facebook is fascinating, but that's not the point of this blog post. As part of the case, there are allegations that documents and...

Buying Exploits on the Grey Market
From Schneier on Security

Buying Exploits on the Grey Market

This article talks about legitimate companies buying zero-day exploits, including the fact that "an undisclosed U.S. government contractor recently paid $250,000...

Friday Squid Blogging: How Squid Hear
From Schneier on Security

Friday Squid Blogging: How Squid Hear

Interesting research: The squid use two closely spaced organs called statocysts to sense sound. "I think of a statocyst as an inside-out tennis ball," explains...

Summer Schools in Cryptography and Software Security at Penn State
From Schneier on Security

Summer Schools in Cryptography and Software Security at Penn State

Normally I just delete these as spam, but this summer program for graduate students 1) looks interesting, and 2) has some scholarship money available.

Harms of Post-9/11 Airline Security
From Schneier on Security

Harms of Post-9/11 Airline Security

As I posted previously, I have been debating former TSA Administrator Kip Hawley on the Economist website. I didn't bother reposting my opening statement and rebuttal...

SHARCS Conference
From Schneier on Security

SHARCS Conference

Last weekend was the 2012 SHARCS (Special-Purpose Hardware for Attacking Cryptographic Systems) conference. The presentations are online.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account