acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

A Revised Taxonomy of Social Networking Data
From Schneier on Security

A Revised Taxonomy of Social Networking Data

Lately I've been reading about user security and privacy -- control, really -- on social networking sites. The issues are hard and the solutions harder, but I'm...

P ? NP?
From Schneier on Security

P ? NP?

There's a new paper circulating that claims to prove that P ? NP. The paper has not been refereed, and I haven't seen any independent verifications or refutations...

Ant Warfare
From Schneier on Security

Ant Warfare

Interesting: According to Moffett, we might actually learn a thing or two from how ants wage war. For one, ant armies operate with precise organization despite...

Friday Squid Blogging: Canadian Squid Stamp
From Schneier on Security

Friday Squid Blogging: Canadian Squid Stamp

It's a giant fiberglass squid from Newfoundland.

Yet Another Way to Sneak Liquids onto an Airplane
From Schneier on Security

Yet Another Way to Sneak Liquids onto an Airplane

Coffee cup disguised as a camera lens.

More Brain Scans to Detect Future Terrorists
From Schneier on Security

More Brain Scans to Detect Future Terrorists

Worked well in a test: For the first time, the Northwestern researchers used the P300 testing in a mock terrorism scenario in which the subjects are planning,More...

NSA and the National Cryptologic Museum
From Schneier on Security

NSA and the National Cryptologic Museum

Most people might not be aware of it, but there's a National Cryptologic Museum at Ft. Meade, at NSA Headquarters. It's hard to know its exact relationship with...

WikiLeaks Insurance File
From Schneier on Security

WikiLeaks Insurance File

Now this is an interesting development: In the wake of strong U.S. government statements condemning WikiLeaks' recent publishing of 77,000 Afghan War documents...

UAE to Ban BlackBerrys
From Schneier on Security

UAE to Ban BlackBerrys

The United Arab Emirates -- Dubai, etc. -- is threatening to ban BlackBerrys because they can't eavesdrop on them. At the heart of the battle is access to thecomplicated...

Location-Based Quantum Encryption
From Schneier on Security

Location-Based Quantum Encryption

Location-based encryption -- a system by which only a recipient in a specific location can decrypt the message -- fails because location can be spoofed. Now asolved...

Eavesdropping Smartphone Apps
From Schneier on Security

Eavesdropping Smartphone Apps

Seems there are a lot of them. They do it for marketing purposes. Really, they seem to do it because the code base they use does it automatically or just because...

Book Review: How Risky Is It, Really?
From Schneier on Security

Book Review: How Risky Is It, Really?

David Ropeik is a writer and consultant who specializes in risk perception and communication. His book, How Risky Is It, Really?: Why Our Fears Don't Always Match...

Friday Squid Blogging: Squid Launcher from "Despicable Me"
From Schneier on Security

Friday Squid Blogging: Squid Launcher from "Despicable Me"

Don't squid me, bro.

Doomsday Shelters
From Schneier on Security

Doomsday Shelters

Selling fear: The Vivos network, which offers partial ownerships similar to a timeshare in underground shelter communities, is one of several ventures touting...

Hacking ATMs
From Schneier on Security

Hacking ATMs

Hacking ATMs to spit out money, demonstrated at the Black Hat conference: The two systems he hacked on stage were made by Triton and Tranax. The Tranax hack was...

Security Vulnerabilities of Smart Electricity Meters
From Schneier on Security

Security Vulnerabilities of Smart Electricity Meters

"Who controls the off switch?" by Ross Anderson and Shailendra Fuloria. Abstract: We're about to acquire a significant new cybervulnerability. The world's energy...

DNSSEC Root Key Split Among Seven People
From Schneier on Security

DNSSEC Root Key Split Among Seven People

The DNSSEC root key has been divided among seven people: Part of ICANN's security scheme is the Domain Name System Security, a security protocol that ensures Web...

Pork-Filled Counter-Islamic Bomb Device
From Schneier on Security

Pork-Filled Counter-Islamic Bomb Device

Okay, this is just weird: Mark S. Price, a specialist in public security, and his privately held company, Paradise Lost Antiterrorism Network of America (www.plan...

WPA Cracking in the Cloud
From Schneier on Security

WPA Cracking in the Cloud

It's a service: The mechanism used involves captured network traffic, which is uploaded to the WPA Cracker service and subjected to an intensive brute force cracking...

1921 Book on Profiling
From Schneier on Security

1921 Book on Profiling

Here's a book from 1921 on how to profile people.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account