acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

The End of In-Flight Wi-Fi?
From Schneier on Security

The End of In-Flight Wi-Fi?

Okay, now the terrorists have really affected me personally: they're forcing us to turn off airplane Wi-Fi. No, it's not that the Yemeni package bombs had a Wi...

Friday Squid Blogging: Squid Costume
From Schneier on Security

Friday Squid Blogging: Squid Costume

Just in time for Halloween.

"A Social Network Approach to Understanding an Insurgency"
From Schneier on Security

"A Social Network Approach to Understanding an Insurgency"

Interesting.

The Business of Botnets
From Schneier on Security

The Business of Botnets

It can be lucrative: Avanesov allegedly rented and sold part of his botnet, a common business model for those who run the networks. Other cybercriminals can rent...

Did the FBI Invent the D.C. Bomb Plot?
From Schneier on Security

Did the FBI Invent the D.C. Bomb Plot?

Last week the police arrested Farooque Ahmed for plotting a terrorist attack on the D.C. Metro system. However, it's not clear how much of the plot was his idea...

Dan Geer on "Cybersecurity and National Policy"
From Schneier on Security

Dan Geer on "Cybersecurity and National Policy"

Worth reading: Those with either an engineering or management background are aware that one cannot optimize everything at once

Control Fraud
From Schneier on Security

Control Fraud

I had never heard the term "control fraud" before: Control fraud theory was developed in the savings and loan debacle. It explained that the person controlling...

Halloween and the Irational Fear of Stranger Danger
From Schneier on Security

Halloween and the Irational Fear of Stranger Danger

From the Wall Street Journal: Take "stranger danger," the classic Halloween horror. Even when I was a kid, back in the "Bewitched" and "Brady Bunch" costume era...

Cargo Security
From Schneier on Security

Cargo Security

The New York Times writes: "Despite the increased scrutiny of people and luggage on passenger planes since 9/11, there are far fewer safeguards for packages and...

Friday Squid Blogging: Dissecting a Giant Squid
From Schneier on Security

Friday Squid Blogging: Dissecting a Giant Squid

Interesting television program from UK Channel 4.

Me at TED
From Schneier on Security

Me at TED

Okay, it's not TED. It's one of the independent regional TED events: TEDxPSU. My talk was "Reconceptualizing Security," a condensation of the hour-long talk into...

The Militarization of the Internet
From Schneier on Security

The Militarization of the Internet

Good blog post.

New Orleans Scrapping Surveillance Cameras
From Schneier on Security

New Orleans Scrapping Surveillance Cameras

They're not worth it: In seven years, New Orleans' crime camera program has yielded six indictments: three for crimes caught on video and three for bribes and...

FBI Bugging Embassies in 1940
From Schneier on Security

FBI Bugging Embassies in 1940

Old -- but recently released -- document discussing the bugging of the Russian embassy in 1940. The document also mentions bugging the embassies of France, Germany...

Firesheep
From Schneier on Security

Firesheep

Firesheep is a new Firefox plugin that makes it easy for you to hijack other people's social network connections. Basically, Facebook authenticates clients with...

Seymour Hersh on Cyberwar
From Schneier on Security

Seymour Hersh on Cyberwar

Excellent article from The New Yorker.

Declassified NSA Documents
From Schneier on Security

Declassified NSA Documents

It's a long list. These items are not online; they're at the National Archives and Records Administration in College Park, MD. You can either ask for copies by...

Steganography in the Longfin Inshore Squid
From Schneier on Security

Steganography in the Longfin Inshore Squid

Really: While the notion that a few animals produce polarization signals and use them in communication is not new, M

Video Interview with Me from RSA Europe
From Schneier on Security

Video Interview with Me from RSA Europe

I was interviewed this week at RSA Europe.

FaceTime for Mac Security Hole
From Schneier on Security

FaceTime for Mac Security Hole

Once a user has logged into FaceTime, anyone with access to the machine can change the user's Apple ID password without knowing the old password.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account