acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Euro Coin Recycling Scam
From Schneier on Security

Euro Coin Recycling Scam

This story is just plain weird. Regularly, damaged coins are taken out of circulation. They're destroyed and then sold to scrap metal dealers. That makes sense...

Israel's Counter-Cyberterrorism Unit
From Schneier on Security

Israel's Counter-Cyberterrorism Unit

You'd think the country would already have one of these: Israel is mulling the creation of a counter-cyberterrorism unit designed to safeguard both government...

How did the CIA and FBI Know that Australian Government Computers were Hacked?
From Schneier on Security

How did the CIA and FBI Know that Australian Government Computers were Hacked?

Newspapers are reporting that, for about a month, hackers had access to computers "of at least 10 federal ministers including the Prime Minister, Foreign Minister...

New French Law Reduces Website Security
From Schneier on Security

New French Law Reduces Website Security

I didn't know about this: The law obliges a range of e-commerce sites, video and music services and webmail providers to keep a host of data on customers. This...

The CIA and Assassinations
From Schneier on Security

The CIA and Assassinations

The former CIA general counsel, John A. Rizzo, talks about his agency's assassination program, which has increased dramatically under the Obama administration: ...

Friday Squid Blogging: A New Book About Squid
From Schneier on Security

Friday Squid Blogging: A New Book About Squid

Wendy Williams, Kraken: The Curious, Exciting, and Slightly Disturbing Science of Squid. Kraken is the traditional name for gigantic sea monsters, and this book...

Get Your Terrorist Alerts on Facebook and Twitter
From Schneier on Security

Get Your Terrorist Alerts on Facebook and Twitter

Colors are so last decade: The U.S. government's new system to replace the five color-coded terror alerts will have two levels of warnings

Pinpointing a Computer to Within 690 Meters
From Schneier on Security

Pinpointing a Computer to Within 690 Meters

This is impressive, and scary: Every computer connected to the web has an internet protocol (IP) address, but there is no simple way to map this to a physical...

Detecting Cheaters
From Schneier on Security

Detecting Cheaters

Our brains are specially designed to deal with cheating in social exchanges. The evolutionary psychology explanation is that we evolved brain heuristics formodus...

Optical Stun Ray
From Schneier on Security

Optical Stun Ray

It's been patented; no idea if it actually works. ...newly patented device can render an assailant helpless with a brief flash of high-intensity light. It works...

Counterterrorism Security Cost-Benefit Analysis
From Schneier on Security

Counterterrorism Security Cost-Benefit Analysis

"Terror, Security, and Money: Balancing the Risks, Benefits, and Costs of Homeland Security," by John Mueller and Mark Stewart: Abstract:The cumulative increase...

Epsilon Hack
From Schneier on Security

Epsilon Hack

I have no idea why the Epsilon hack is getting so much press. Yes, millions of names and e-mail addresses might have been stolen. Yes, other customer information...

Reducing Bribery by Legalizing the Giving of Bribes
From Schneier on Security

Reducing Bribery by Legalizing the Giving of Bribes

Here's some very clever thinking from India's chief economic adviser. In order to reduce bribery, he proposes legalizing the giving of bribes: Under the current...

Ebook Fraud
From Schneier on Security

Ebook Fraud

Interesting post -- and discussion -- on Making Light about ebook fraud. Currently there are two types of fraud. The first is content farming, discussed in these...

Friday Squid Blogging: Shower Squid
From Schneier on Security

Friday Squid Blogging: Shower Squid

Neat.

34 SCADA Vulnerabilities Published
From Schneier on Security

34 SCADA Vulnerabilities Published

It's hard to tell how serious this is. Computer security experts who examined the code say the vulnerabilities are not highly dangerous on their own, because they...

Comodo Group Issues Bogus SSL Certificates
From Schneier on Security

Comodo Group Issues Bogus SSL Certificates

This isn't good: The hacker, whose March 15 attack was traced to an IP address in Iran, compromised a partner account at the respected certificate authority Comodo...

FBI Asks for Cryptanalysis Help
From Schneier on Security

FBI Asks for Cryptanalysis Help

Could be interesting.

How Peer Review Doesn't Work
From Schneier on Security

How Peer Review Doesn't Work

In this amusing story of a terrorist plotter using pencil-and-paper cryptography instead of actually secure cryptography, there's this great paragraph: Despite...

Federated Authentication
From Schneier on Security

Federated Authentication

New paper by Ross Anderson: "Can We Fix the Security Economics of Federated Authentication?": There has been much academic discussion of federated authentication...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account