acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

TSA Cupcake Update
From Schneier on Security

TSA Cupcake Update

The TSA claims that the cupcake they confiscated was in a jar. So this is a less obviously stupid story than I previously thought.

A Theory of Online Jihadist Sites
From Schneier on Security

A Theory of Online Jihadist Sites

Very interesting: The counterterrorism community has spent years trying to determine why so many people are engaged in online jihadi communities in such a meaningful...

Apple Split-Key Patent
From Schneier on Security

Apple Split-Key Patent

Apple has a patent on splitting a key between a portable device and its power supply. Clever idea.

Protecting Your Privacy at International Borders
From Schneier on Security

Protecting Your Privacy at International Borders

The EFF has published a good guide. My own advice is here and here.

Collecting Expert Predictions about Terrorist Attacks
From Schneier on Security

Collecting Expert Predictions about Terrorist Attacks

John Mueller has been collecting them: Some 116 of these Very People were surveyed in 2006 by Foreign Policy magazine in a joint project with the Center for America...

Stealing Source Code
From Schneier on Security

Stealing Source Code

Hackers stole some source code to Symantec's products. We don't know what was stolen or how recent the code is -- the company is, of course, minimizing the story...

The TSA Proves its Own Irrelevance
From Schneier on Security

The TSA Proves its Own Irrelevance

Have you wondered what $1.2 billion in airport security gets you? The TSA has compiled its own "Top 10 Good Catches of 2011": 10) Snakes, turtles, and birds were...

Friday Squid Blogging: Squid Skateboards
From Schneier on Security

Friday Squid Blogging: Squid Skateboards

Great designs..

Time to Patch Your HP Printers
From Schneier on Security

Time to Patch Your HP Printers

It's a serious vulnerability. Note that this is the research that was mistakenly reported as allowing hackers to set your printer on fire. Here's a list of all...

Improving the Security of Four-Digit PINs on Cell Phones
From Schneier on Security

Improving the Security of Four-Digit PINs on Cell Phones

The author of this article notices that it's often easy to guess a cell phone PIN because of smudge marks on the screen. Those smudge marks indicate the four PIN...

<i>Liars and Outliers</i> News
From Schneier on Security

Liars and Outliers News

The Liars and Outliers webpage is live. On it you can find links to order both paper and e-book copies from a variety of online retailers, and signed copies directly...

Newly Released Papers from NSA Journals
From Schneier on Security

Newly Released Papers from NSA Journals

The papers are old, but they have just been released under FOIA.

Sending Coded Messages with Postage Stamps
From Schneier on Security

Sending Coded Messages with Postage Stamps

The history of coded messages in postage-stamp placement. I wonder how prevalent this actually was. My guess is that it was more a clever idea than an actual...

Allocating Security Resources to Protect Critical Infrastructure
From Schneier on Security

Allocating Security Resources to Protect Critical Infrastructure

Alan T. Murray and Tony H. Grubesic, "Critical Infrastructure Protection: The Vulnerability Conundrum," Telematics & Informatics, 29 (February 2012): 56

Applying Game Theory to Cyberattacks and Defenses
From Schneier on Security

Applying Game Theory to Cyberattacks and Defenses

Behzad Zare Moayedi, Mohammad Abdollahi Azgomi, "A Game Theoretic Framework for Evaluation of the Impacts of Hackers Diversity on Security Measures," Reliability...

Studying Airport Security
From Schneier on Security

Studying Airport Security

Alan A. Kirschenbaum, Michele Mariani, Coen Van Gulijk, Sharon Lubasz, Carmit Rapaport, and Hinke Andriessen, "Airport Security: An Ethnographic Study," Journal...

Tying Up Phone Lines as a Cyberattack Tactic
From Schneier on Security

Tying Up Phone Lines as a Cyberattack Tactic

There's a service that can be hired to tie up target phone lines indefinitely. The article talks about how this can be used as a diversionary tactic to mask a...

Hacking Marconi's Wireless in 1903
From Schneier on Security

Hacking Marconi's Wireless in 1903

A great story: Yet before the demonstration could begin, the apparatus in the lecture theatre began to tap out a message. At first, it spelled out just one word...

Butt Identification
From Schneier on Security

Butt Identification

Here's a new biometric: how you sit: ...researchers there developed a system that can recognize a person by the backside when the person takes a seat. The system...

The Collar Bomb Robbery
From Schneier on Security

The Collar Bomb Robbery

Really interesting story of the collar-bomb robbery -- and subsequent investigation -- from 2003.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account