acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Tor Arms Race
From Schneier on Security

Tor Arms Race

Iran blocks Tor, and Tor releases a workaround on the same day. How did the filter work technically? Tor tries to make its traffic look like a web browser talking...

Friday Squid Blogging: Sex Life of Deep-Sea Squid
From Schneier on Security

Friday Squid Blogging: Sex Life of Deep-Sea Squid

There's evidence of indiscriminate fertilization in deep-sea squid. They mate with any other squid the encounter, male or female. This unusual behaviour, they...

Man-in-the-Middle Attack Against SSL 3.0/TLS 1.0
From Schneier on Security

Man-in-the-Middle Attack Against SSL 3.0/TLS 1.0

It's the Browser Exploit Against SSL/TLS Tool, or BEAST: The tool is based on a blockwise-adaptive chosen-plaintext attack, a man-in-the-middle approach that injects...

Three Emerging Cyber Threats
From Schneier on Security

Three Emerging Cyber Threats

On Monday I participated a panel at the Information Systems Forum in Berlin. The moderator asked us what the top three emerging threats were in cyberspace. I...

An Interesting Software Liability Proposal
From Schneier on Security

An Interesting Software Liability Proposal

This proposal is worth thinking about. Clause 1. If you deliver software with complete and buildable source code and a license that allows disabling any functionality...

U.S.-Australia Cyberwar Treaty
From Schneier on Security

U.S.-Australia Cyberwar Treaty

The long-standing ANZUS military treaty now includes cyberspace attacks: According to Reuters, the decision was made in discussions between the two countries this...

Shifting Risk Instead of Reducing Risk
From Schneier on Security

Shifting Risk Instead of Reducing Risk

Risks of teen driving: For more than a decade, California and other states have kept their newest teen drivers on a tight leash, restricting the hours when they...

Complex Electronic Banking Fraud in Malaysia
From Schneier on Security

Complex Electronic Banking Fraud in Malaysia

The interesting thing about this attack is how it abuses a variety of different security systems. Investigations revealed that the syndicate members had managed...

Pretty Creepy Type of Cyberstalking
From Schneier on Security

Pretty Creepy Type of Cyberstalking

Luis "Guicho" Mijangos, "sextortionist."

The Effectiveness of Plagiarism Detection Software
From Schneier on Security

The Effectiveness of Plagiarism Detection Software

As you'd expect, it's not very good: But this measure [Turnitin] captures only the most flagrant form of plagiarism, where passages are copied from one document...

Friday Squid Blogging: Squid Street Art
From Schneier on Security

Friday Squid Blogging: Squid Street Art

Nice.

Identifying Speakers in Encrypted Voice Communication
From Schneier on Security

Identifying Speakers in Encrypted Voice Communication

I've already written how it is possible to detect words and phrases in encrypted VoIP calls. Turns out it's possible to detect speakers as well: Abstract: Most...

Domain-in-the-Middle Attacks
From Schneier on Security

Domain-in-the-Middle Attacks

It's an easy attack. Register a domain that's like your target except for a typo. So it would be countrpane.com instead of counterpane.com, or mailcounterpane...

Sharing Security Information and the Prisoner's Dilemma
From Schneier on Security

Sharing Security Information and the Prisoner's Dilemma

New paper: Dengpan Liu, Yonghua Ji, and Vijay Mookerjee (2011), "Knowledge Sharing and Investment Decisions in Information Security," Decision Support Systems,...

A Status Report: "Liars and Outliers"
From Schneier on Security

A Status Report: "Liars and Outliers"

It's been a long hard year, but the book is almost finished. It's certainly the most difficult book I've ever written, mostly because I've had to learn academic...

Risk Tolerance and Culture
From Schneier on Security

Risk Tolerance and Culture

This is an interesting study on cultural differences in risk tolerance. The Cultures of Risk Tolerance Abstract: This study explores the links between culture...

TSA Administrator John Pistole on the Future of Airport Security
From Schneier on Security

TSA Administrator John Pistole on the Future of Airport Security

There's a lot here that's worth watching. He talks about expanding behavioral detection. He talks about less screening for "trusted travelers." So, what do the...

Human Pattern-Matching Failures in Airport Screening
From Schneier on Security

Human Pattern-Matching Failures in Airport Screening

I've written about this before: the human brain just isn't suited to finding rare anomalies in a screening situation. The Role of the Human Operator in Image-Based...

Risk Perception and Terrorism
From Schneier on Security

Risk Perception and Terrorism

I've been posting about a lot of academic articles of late, because that's what I'm reading. Here's another. Clinton M. Jenkin (2006), Risk Perception and Terrorism...

More 9/11 Retrospectives
From Schneier on Security

More 9/11 Retrospectives

Joseph Stiglitz on the price of 9/11. How 9/11 changed surveillance. New scientific research as a result of 9/11. A good controversial piece. The day we lost...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account