acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Questioning Terrorism Policy
From Schneier on Security

Questioning Terrorism Policy

Worth reading: ...what if we chose to accept the fact that every few years, despite all reasonable precautions, some hundreds or thousands of us may die in the...

Friday Squid Blogging: Squid Eyes
From Schneier on Security

Friday Squid Blogging: Squid Eyes

Squid eyes.

Master HDCP Key Cracked
From Schneier on Security

Master HDCP Key Cracked

The master key for the High-Bandwidth Digital Content Protection standard -- that's what encrypts digital television between set-top boxes and digital televisions...

Automatic Document Declassification
From Schneier on Security

Automatic Document Declassification

DARPA is looking for something that can automatically declassify documents: I'll be honest: I'm not exactly sure what kind of technological solution you can build...

DHS <i>Still</i> Worried About Terrorists Using Internet Surveillance
From Schneier on Security

DHS Still Worried About Terrorists Using Internet Surveillance

Profound analysis from the Department of Homeland Security: Detailed video obtained through live Web-based camera feeds combined with street-level and direct overhead...

Popular Usernames and Passwords
From Schneier on Security

Popular Usernames and Passwords

Graphical representation.

Highway Honeypot
From Schneier on Security

Highway Honeypot

Police set up a highway sign warning motorists that there are random stops for narcotics checks ahead, but actually search people who take the next exit.

Not Answering Questions at U.S. Customs
From Schneier on Security

Not Answering Questions at U.S. Customs

Interesting story: I was detained last night by federal authorities at San Francisco International Airport for refusing to answer questions about why I had travelled...

Vulnerabilities in US-CERT Network
From Schneier on Security

Vulnerabilities in US-CERT Network

You'd think US-CERT would do somewhat better.

Kenzero
From Schneier on Security

Kenzero

Kenzero is a Japanese Trojan that collects and publishes users' porn surfing habits, and then blackmails them to remove the information.

Friday Squid Blogging: Cephalopod Consciousness
From Schneier on Security

Friday Squid Blogging: Cephalopod Consciousness

"Three Arguments for the Consciousness of Cephalopods."

<i>The Onion</i> on National Security
From Schneier on Security

The Onion on National Security

"Smart, Qualified People Behind the Scenes Keeping America Safe: 'We Don't Exist'"

Problems with Twitter's OAuth Authentication System
From Schneier on Security

Problems with Twitter's OAuth Authentication System

Interesting case study.  

Orange Balls as an Anti-Robbery Device
From Schneier on Security

Orange Balls as an Anti-Robbery Device

In Japan: These balls full of orange paint are anti-theft devices. When someone robs a store, the clerk can throw the ball at the perp (or at the perp's feet)...

New German ID Card Hackable
From Schneier on Security

New German ID Card Hackable

No surprise.

Parental Fears vs. Realities
From Schneier on Security

Parental Fears vs. Realities

From NPR: Based on surveys Barnes collected, the top five worries of parents are, in order: Kidnapping School snipers Terroristsknows,...

Consumerization and Corporate IT Security
From Schneier on Security

Consumerization and Corporate IT Security

If you're a typical wired American, you've got a bunch of tech tools you like and a bunch more you covet. You have a cell phone that can easily text. You've got...

Terrorism Entrapment
From Schneier on Security

Terrorism Entrapment

Back in 2007, I wrote an essay, "Portrait of the Modern Terrorist as an Idiot," where I said: The JFK Airport plotters seem to have been egged on by an informant...

Friday Squid Blogging: Squid Car
From Schneier on Security

Friday Squid Blogging: Squid Car

Squid car.

UAE Man-in-the-Middle Attack Against SSL
From Schneier on Security

UAE Man-in-the-Middle Attack Against SSL

Interesting: Who are these certificate authorities? At the beginning of Web history, there were only a handful of companies, like Verisign, Equifax, and Thawte...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account