acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Bypassing the Chain on Hotel-Room Doors
From Schneier on Security

Bypassing the Chain on Hotel-Room Doors

Technique, plus video.

Privacy and Control
From Schneier on Security

Privacy and Control

In January, Facebook Chief Executive, Mark Zuckerberg, declared the age of privacy to be over. A month earlier, Google Chief Eric Schmidt expressed a similar sentiment...

Detecting Being Watched
From Schneier on Security

Detecting Being Watched

This seems like science fiction to me: The camera uses the same "red eye" effect of from camera flashes to project it hundreds of meters, allowing it to identify...

"Protecting Europe Against Large-Scale Cyber-Attacks"
From Schneier on Security

"Protecting Europe Against Large-Scale Cyber-Attacks"

Report from the House of Lords in the UK (pdf version).

Friday Squid Blogging: Squid Confit
From Schneier on Security

Friday Squid Blogging: Squid Confit

Looks tasty.

iPhone Secret Decoder Ring
From Schneier on Security

iPhone Secret Decoder Ring

It'll protect your secrets from your kid sister, unless she's smarter than that. Looks cool, though.

DHS Cybersecurity Awareness Campaign Challenge
From Schneier on Security

DHS Cybersecurity Awareness Campaign Challenge

This is a little hokey, but better them than the NSA: The National Cybersecurity Awareness Campaign Challenge Competition is designed to solicit ideas from industry...

Explosive Breast Implants -- Not an April Fool's Joke
From Schneier on Security

Explosive Breast Implants -- Not an April Fool's Joke

Is MI5 playing a joke on us? Female homicide bombers are being fitted with exploding breast implants which are almost impossible to detect, British spies havecould...

Fifth Annual Movie-Plot Threat Contest
From Schneier on Security

Fifth Annual Movie-Plot Threat Contest

Once upon a time, men and women throughout the land lived in fear. This caused them to do foolish things that made them feel better temporarily, but didn't make...

Security Cameras in the New York City Subways
From Schneier on Security

Security Cameras in the New York City Subways

The New York Times has an article about cameras in the subways. The article is all about how horrible it is that the cameras don't work: Moreover, nearly half...

Should the Government Stop Outsourcing Code Development?
From Schneier on Security

Should the Government Stop Outsourcing Code Development?

Information technology is increasingly everywhere, and it's the same technologies everywhere. The same operating systems are used in corporate and government computers...

Leaders Make Better Liars
From Schneier on Security

Leaders Make Better Liars

According to new research: The researchers found that subjects assigned leadership roles were buffered from the negative effects of lying. Across all measures,...

Jeremy Clarkson on Security Guards
From Schneier on Security

Jeremy Clarkson on Security Guards

Nice essay: Of course, we know why he's really there. He's really there so that if the bridge is destroyed by terrorists, the authorities can appear on the television...

Master Thief
From Schneier on Security

Master Thief

The amazing story of Gerald Blanchard. Thorough as ever, Blanchard had spent many previous nights infiltrating the bank to do recon or to tamper with the locks...

Identifying People by their Bacteria
From Schneier on Security

Identifying People by their Bacteria

A potential new forensic: To determine how similar a person's fingertip bacteria are to bacteria left on computer keys, the team took swabs from three computer...

Friday Squid Blogging: Sexing Squid
From Schneier on Security

Friday Squid Blogging: Sexing Squid

Tips and tricks.

Schneier Blogging Template
From Schneier on Security

Schneier Blogging Template

Eerily accurate: Catchy one-liner ("interesting," with link): In this part of the blog post, Bruce quotes something from the article he links to in the catchy...

Hard Drives in Photocopy Machines
From Schneier on Security

Hard Drives in Photocopy Machines

Modern photocopy machines contain hard drives that often have scans of old documents. This matters when an office disposes of an old copier. It also matters if...

Side-Channel Attacks on Encrypted Web Traffic
From Schneier on Security

Side-Channel Attacks on Encrypted Web Traffic

Nice paper: "Side-Channel Leaks in Web Applications: a Reality Today, a Challenge Tomorrow," by Shuo Chen, Rui Wang, XiaoFeng Wang, and Kehuan Zhang. Abstract.explains...

I'll be in Second Life Tonight
From Schneier on Security

I'll be in Second Life Tonight

James Fallows and I are being interviewed in Second Life tonight, 9:00 PM Eastern Time.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account