acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Friday Squid Blogging: Squid <i>Sous Vide</i>
From Schneier on Security

Friday Squid Blogging: Squid Sous Vide

Yum: We learned to cook squid sous vide at 59

Interview with Me About the Sony Hack
From Schneier on Security

Interview with Me About the Sony Hack

These are what I get for giving interviews when I'm in a bad mood. For the record, I think Sony did a terrible job with its customers' security. I also think...

Drugging People and Then Robbing Them
From Schneier on Security

Drugging People and Then Robbing Them

This is a pretty scary criminal tactic from Turkey. Burglars dress up as doctors, and ring doorbells handing out pills under some pretense or another. They're...

FBI Surveillance Tools
From Schneier on Security

FBI Surveillance Tools

Interesting blog post from EFF.

RFID Tags Protecting Hotel Towels
From Schneier on Security

RFID Tags Protecting Hotel Towels

The stealing of hotel towels isn't a big problem in the scheme of world problems, but it can be expensive for hotels. Sure, we have moral prohibitions againstmore...

"Resilience of the Internet Interconnection Ecosystem"
From Schneier on Security

"Resilience of the Internet Interconnection Ecosystem"

This blog post by Richard Clayton is worth reading. If you have more time, there's 238-page report and a 31-page executive summary.

Medieval Tally Stick Discovered in Germany
From Schneier on Security

Medieval Tally Stick Discovered in Germany

Interesting: The well-preserved tally stick was used in the Middle Ages to count the debts owed by the holder in a time when most people were unable to read or...

The Era of "Steal Everything"
From Schneier on Security

The Era of "Steal Everything"

Good comment: "We're moving into an era of 'steal everything'," said David Emm, a senior security researcher for Kaspersky Labs. He believes that cyber criminals...

Vulnerabilities in Online Payment Systems
From Schneier on Security

Vulnerabilities in Online Payment Systems

This hack was conducted as a research project. It's unlikely it's being done in the wild: In one attack, Wang and colleagues used a plug-in for the Firefox web...

Status Report: <i>The Dishonest Minority</i>
From Schneier on Security

Status Report: The Dishonest Minority

Three months ago, I announced that I was writing a book on why security exists in human societies. This is basically the book's thesis statement: All complex...

Friday Squid Blogging: Noise Pollution and Squid
From Schneier on Security

Friday Squid Blogging: Noise Pollution and Squid

It literally blows holes in their heads: In the study, led by Michel Andr

Friday Squid Blogging: Squids in Space
From Schneier on Security

Friday Squid Blogging: Squids in Space

There are live squids on the last Endeavor mission.

Forged Memory
From Schneier on Security

Forged Memory

A scary development in rootkits: Rootkits typically modify certain areas in the memory of the running operating system (OS) to hijack execution control from the...

Stolen Camera Finder
From Schneier on Security

Stolen Camera Finder

Here's a clever Web app that locates your stolen camera by searching the EXIF data on public photo databases for your camera's serial number.

Extreme Authentication
From Schneier on Security

Extreme Authentication

Exactly how did they confirm it was Bin Laden's body? Officials compared the DNA of the person killed at the Abbottabad compound with the bin Laden "family DNA"...

Osama's Death Causes Spike in Suspicious Package Reports
From Schneier on Security

Osama's Death Causes Spike in Suspicious Package Reports

It's not that the risk is greater, it's that the fear is greater. Data from New York: There were 10,566 reports of suspicious objects across the five boroughs...

"Operation Pumpkin"
From Schneier on Security

"Operation Pumpkin"

Wouldn't it be great if this were not a joke: the security contingency that was in place in the event that Kate Middleton tried to run away just before the wedding...

Unintended Security Consequences of the New Pyrex Recipe
From Schneier on Security

Unintended Security Consequences of the New Pyrex Recipe

This is interesting: When World Kitchen took over the Pyrex brand, it started making more products out of prestressed soda-lime glass instead of borosilicate....

Decline in Cursive Writing Leads to Increase in Forgery Risk?
From Schneier on Security

Decline in Cursive Writing Leads to Increase in Forgery Risk?

According to this article, students are no longer learning how to write in cursive. And, if they are learning it, they're forgetting how. Certainly the ubiquity...

Nikon Image Authentication System Cracked
From Schneier on Security

Nikon Image Authentication System Cracked

Not a lot of details: ElcomSoft research shows that image metadata and image data are processed independently with a SHA-1 hash function. There are two 160-bit...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account