acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

ACLU Report on the War on Terror
From Schneier on Security

ACLU Report on the War on Terror

This report is really good: "A Call to Courage: Reclaiming Our Liberties Ten Years After 9/11."

Friday Squid Blogging:  Beautiful Squid Drawings
From Schneier on Security

Friday Squid Blogging: Beautiful Squid Drawings

From Italy. As before, use the comments to this post to write about and discuss security stories that don't have their own post.

New Lows in Secret Questions
From Schneier on Security

New Lows in Secret Questions

I've already written about secret questions, the easier-to-guess low-security backup password that sites want you to have in case you forget your harder-to-remember...

The Legality of Government Critical Infrastructure Monitoring
From Schneier on Security

The Legality of Government Critical Infrastructure Monitoring

Mason Rice, Robert Miller, and Sujeet Shenoi (2011), "May the US Government Monitor Private Critical Infrastructure Assets to Combat Foreign Cyberspace Threats?...

Outing a CIA Agent
From Schneier on Security

Outing a CIA Agent

Interesting article on how difficult it is to keep an identity secret in the information age.

Optimizing Airport Security
From Schneier on Security

Optimizing Airport Security

New research: Adrian J. Lee and Sheldon H. Jacobson (2011), "The Impact of Aviation Checkpoint Queues on Optimizing Security Screening Effectiveness," Reliability...

Where Are All the Terrorists?
From Schneier on Security

Where Are All the Terrorists?

From Foreign Policy: "Why Is It So Hard to Find a Suicide Bomber These Days?" And from Stratfor: "Why al Qaeda is Unlikely to Execute Another 9/11." Me from May...

Friday Squid Blogging: SQUIDS Game
From Schneier on Security

Friday Squid Blogging: SQUIDS Game

It's coming to the iPhone and iPad, then to other platforms: In SQUIDS, players will command a small army of stretchy, springy sea creatures to protect an idyllic...

The Efficacy of Post-9/11 Counterterrorism
From Schneier on Security

The Efficacy of Post-9/11 Counterterrorism

This is an interesting article. The authors argue that the whole war-on-terror nonsense is useless -- that's not new -- but that the security establishment knows...

A Professional ATM Theft
From Schneier on Security

A Professional ATM Theft

Fidelity National Information Services Inc. (FIS) lost $13M to an ATM theft earlier this year: KrebsOnSecurity recently discovered previously undisclosed details...

Unredacted U.S. Diplomatic WikiLeaks Cables Published
From Schneier on Security

Unredacted U.S. Diplomatic WikiLeaks Cables Published

It looks as if the entire mass of U.S. diplomatic cables that WikiLeaks had is available online somewhere. How this came about is a good illustration of how security...

Forged Google Certificate
From Schneier on Security

Forged Google Certificate

There's been a forged Google certificate out in the wild for the past month and a half. Whoever has it -- evidence points to the Iranian government -- can, if...

Job Opening: TSA Public Affairs Specialist
From Schneier on Security

Job Opening: TSA Public Affairs Specialist

This job can't be fun: This Public Affairs Specialist position is located in the Office of Strategic Communications and Public Affairs (SCPA), Transportation Security...

The Effects of Social Media on Undercover Policing
From Schneier on Security

The Effects of Social Media on Undercover Policing

Social networking sites make it very difficult, if not impossible, to have undercover police officers: "The results found that 90 per cent of female officers were...

Facebook Privacy Guide
From Schneier on Security

Facebook Privacy Guide

It's actually pretty good. Also note that the site is redesigning its privacy. As we learned from Microsoft, nothing motivates a company to improve its security...

Details of the RSA Hack
From Schneier on Security

Details of the RSA Hack

We finally have some, even though the company isn't talking: So just how well crafted was the e-mail that got RSA hacked? Not very, judging by what F-Secure found...

Screenshots of Chinese Hacking Tool
From Schneier on Security

Screenshots of Chinese Hacking Tool

It's hard to know how serious this really is: The screenshots appear as B-roll footage in the documentary for six seconds

Friday Squid Blogging: Squid Fishing in Ulleungdo, Korea
From Schneier on Security

Friday Squid Blogging: Squid Fishing in Ulleungdo, Korea

The industry is in decline: A generation ago, most of the island's 10,000 residents worked in the squid industry, either as sellers like Kim or as farmer-fishermen...

Preventing the Theft of Wire Cutters
From Schneier on Security

Preventing the Theft of Wire Cutters

This is a picture of a pair of wire cutters secured to a table with a wire. Someone isn't thinking this through....

The Problem with Using the Cold War Metaphor to Describe Cyberspace Risks
From Schneier on Security

The Problem with Using the Cold War Metaphor to Describe Cyberspace Risks

Nice essay on the problems with talking about cyberspace risks using "Cold War" metaphors: The problem with threat inflation and misapplied history is that there...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account