acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Surviving a Terrorist's Nuclear Attack
From Schneier on Security

Surviving a Terrorist's Nuclear Attack

Interesting reading, mostly for the probable effects of a terrorist-sized nuclear bomb. A terrorist bomb is likely to be relatively small -- possibly only a fraction...

Stealing SIM Cards from Traffic Lights
From Schneier on Security

Stealing SIM Cards from Traffic Lights

Johannesburg installed hundreds of networked traffic lights on its streets. The lights use a cellular modem and a SIM card to communicate. Those lights introduced...

The Security Threat of Forged Law-Enforcement Credentials
From Schneier on Security

The Security Threat of Forged Law-Enforcement Credentials

Here's a U.S. Army threat assessment of forged law-enforcement credentials. The authors bought a bunch of fake badges: Between November 2009 and March 2010, undercover...

Attacking High-Frequency Trading Networks
From Schneier on Security

Attacking High-Frequency Trading Networks

Turns out you can make money by manipulating the network latency. cPacket has developed a proof of concept showing that these side-channel attacks can be usedthis...

"Homeland Security Hasn't Made Us Safer"
From Schneier on Security

"Homeland Security Hasn't Made Us Safer"

This will be nothing new to readers of this blog, but it's nice to read other people saying it too.

James Fallows on Political Shootings
From Schneier on Security

James Fallows on Political Shootings

Interesting: So the train of logic is: anything that can be called an "assassination" is inherently political; very often the "politics" are obscure, personal...

Friday Squid Blogging: Biggest Squid Ever
From Schneier on Security

Friday Squid Blogging: Biggest Squid Ever

It's an oil field: Brazil's state-run Petrobras confirmed Wednesday that oil fields recently discovered offshore contained 8.3 billion barrels of recoverable crude...

The Social Dynamics of Terror
From Schneier on Security

The Social Dynamics of Terror

Good essay: Nineteenth-century anarchists promoted what they called the "propaganda of the deed," that is, the use of violence as a symbolic action to make a larger...

SMS of Death
From Schneier on Security

SMS of Death

This will be hard to fix: Using only Short Message Service (SMS) communications

Sony PS3 Security Broken
From Schneier on Security

Sony PS3 Security Broken

Sony used an ECDSA signature scheme to protect the PS3. Trouble is, they didn't pay sufficient attention to their random number generator.

Eavesdropping on GSM Calls
From Schneier on Security

Eavesdropping on GSM Calls

It's easy and cheap: Speaking at the Chaos Computer Club (CCC) Congress in Berlin on Tuesday, a pair of researchers demonstrated a start-to-finish means of eavesdropping...

Guard Towers at WalMart
From Schneier on Security

Guard Towers at WalMart

This feels very creepy and police-state-like. What on earth could WalMart be worried about?

Polar Bears Destroying Hidden Cameras
From Schneier on Security

Polar Bears Destroying Hidden Cameras

Watch the video. What valuable security lessons does this teach? EDITED TO ADD (1/3): And why aren't the polar bears destroying the hidden cameras that are...

Friday Squid Blogging: Research into Squid Skin
From Schneier on Security

Friday Squid Blogging: Research into Squid Skin

DoD awarded a $6M grant to study squid skin: "Our internal nickname for this project is 'squid skin,' but it is really about fundamental research," said Naomi...

Tor Routers
From Schneier on Security

Tor Routers

Home routers that automatically run Tor.

Civil War Message Decoded
From Schneier on Security

Civil War Message Decoded

Interesting.

TSA Inspecting Thermoses
From Schneier on Security

TSA Inspecting Thermoses

This is new: Adm. James Winnefeld told The Associated Press Friday that the Transportation Security Administration is "always trying to think ahead." Winnefeld...

Terrorism Reading List
From Schneier on Security

Terrorism Reading List

Interesting interview, discussing five books (none of which I've read, by the way).

An Honest Privacy Policy
From Schneier on Security

An Honest Privacy Policy

Funny: The data we collect is strictly anonymous, unless you've been kind enough to give us your name, email address, or other identifying information. And even...

This Suspicious Photography Stuff Is Confusing
From Schneier on Security

This Suspicious Photography Stuff Is Confusing

See: Last week, Metro Transit Police received a report from a rider about suspicious behavior at the L'Enfant Plaza station and on an Orange Line train to Vienna...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account