acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Malware in Google's Android
From Schneier on Security

Malware in Google's Android

This is not a good development.

The Non-Anonymity of Bubble Forms
From Schneier on Security

The Non-Anonymity of Bubble Forms

It turns out that "fill-in-the-bubble" forms are not so anonymous.

Status Report on the War on Photography
From Schneier on Security

Status Report on the War on Photography

Worth reading: Morgan Leigh Manning, "Less than Picture Perfect: The Legal Relationship between Photographers' Rights and Law Enforcement," Tennessee Law Review...

Yet Another Way to Evade TSA's Full-Body Scanners
From Schneier on Security

Yet Another Way to Evade TSA's Full-Body Scanners

Last night, at the Third EPIC Champion of Freedom Awards Dinner, we gave an award to Susie Castillo, whose blog post and video of her treatment in the hands of...

Why it's So Difficult to Trace Cyber-Attacks
From Schneier on Security

Why it's So Difficult to Trace Cyber-Attacks

I've been asked this question by countless reporters in the past couple of weeks. Here's a good explanation. Shorter answer: it's easy to spoof source destination...

Friday Squid Blogging: Squid Cartoon
From Schneier on Security

Friday Squid Blogging: Squid Cartoon

Savage Chickens.

Two Good Rants
From Schneier on Security

Two Good Rants

Patrick Gray on why we secretly love LulzSec, and Robert Cringely on why we openly hate RSA.

New Airport Scanning Technology
From Schneier on Security

New Airport Scanning Technology

Interesting: Iscon's patented, thermo-conductive technology combines infrared (IR) and heat transfer, for high-resolution imaging without using any radiation....

Spam as a Business
From Schneier on Security

Spam as a Business

Interesting research: Kirill Levchenko, et al. (2010), "Click Trajectories -- End-to-End Analysis of the Spam Value Chain," IEEE Symposium on Security and Privacy...

25% of U.S. Criminal Hackers are Police Informants
From Schneier on Security

25% of U.S. Criminal Hackers are Police Informants

I have no idea if this is true: In some cases, popular illegal forums used by cyber criminals as marketplaces for stolen identities and credit card numbers have...

Tennessee Makes Password Sharing Illegal
From Schneier on Security

Tennessee Makes Password Sharing Illegal

Here's a new law that won't work: State lawmakers in country music's capital have passed a groundbreaking measure that would make it a crime to use a friend's...

Fighting Terrorism with Cupcakes
From Schneier on Security

Fighting Terrorism with Cupcakes

MI6 hacked into an online al-Qaeda magazine and replaced bomb-making instructions with a cupcake recipe. It's a more polite hack than subtly altering the recipe...

Analysis of Redaction Failures
From Schneier on Security

Analysis of Redaction Failures

Redaction failures are so common that I stopped blogging about them years ago. This is the first analysis I have seen of technical redaction failures. And here's...

Friday Squid Blogging: LOLCat and Squid Toy
From Schneier on Security

Friday Squid Blogging: LOLCat and Squid Toy

Cute.

World War II Tunny Cryptanalysis Machine Rebuilt at Bletchley Park
From Schneier on Security

World War II Tunny Cryptanalysis Machine Rebuilt at Bletchley Park

Neat: The rebuild team had only a few photographs, partial circuit diagrams and the fading memories of a few original Tunny operators to go on. Nonetheless a team...

Security vs. Privacy
From Schneier on Security

Security vs. Privacy

Daniel Solove on the security vs. privacy debate.  

Open-Source Software Feels Insecure
From Schneier on Security

Open-Source Software Feels Insecure

At first glance, this seems like a particularly dumb opening line of an article: Open-source software may not sound compatible with the idea of strong cybersecurity...

Spear Phishing Attacks from China Against Gmail Accounts
From Schneier on Security

Spear Phishing Attacks from China Against Gmail Accounts

Reporters have been calling me pretty much constantly about this story, but I can't figure out why in the world this is news. Attacks from China -- old news; attacks...

Man-in-the-Middle Attack Against the MCAT Exam
From Schneier on Security

Man-in-the-Middle Attack Against the MCAT Exam

In Applied Cryptography, I wrote about the "Chess Grandmaster Problem," a man-in-the-middle attack. Basically, Alice plays chess remotely with two grandmasters...

Three-Volume History of Counterintelligence
From Schneier on Security

Three-Volume History of Counterintelligence

CI Reader: An American Revolution Into the New Millennium, Volumes I, II, and III is published by the U.S. Office of the National Counterintelligence Executive....
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account