acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Friday Squid Blogging: Squidsoup
From Schneier on Security

Friday Squid Blogging: Squidsoup

Gallery of virtual art.

Pigs Defeating RFID-Enabled Feeding Systems
From Schneier on Security

Pigs Defeating RFID-Enabled Feeding Systems

Pretty clever (for a pig, that is).

1,000 Cybersecurity Experts
From Schneier on Security

1,000 Cybersecurity Experts

Yesterday, DHS Secretary Janet Napolitano said that the U.S. needed to hire 1,000 cybersecurity experts over the next three years. Bob Cringly doubts that there...

The Futility of Defending the Targets
From Schneier on Security

The Futility of Defending the Targets

This is just silly: Beaver Stadium is a terrorist target. It is most likely the No. 1 target in the region. As such, it deserves security measures commensurate...

Detecting Forged Signatures Using Pen Pressure and Angle
From Schneier on Security

Detecting Forged Signatures Using Pen Pressure and Angle

Interesting: Songhua Xu presented an interesting idea for measuring pen angle and pressure to present beautiful flower-like visual versions of a handwritten signature...

Hotel Safe Scam
From Schneier on Security

Hotel Safe Scam

This is interesting: Since then, his scams have tended to take place in luxury hotels around the world. Typically, he would arrive at a hotel, claim to be a guest...

Detecting People Who Want to Do Harm
From Schneier on Security

Detecting People Who Want to Do Harm

I'm dubious: At a demonstration of the technology this week, project manager Robert P. Burns said the idea is to track a set of involuntary physiological reactions...

Computer-Assisted Witness Identification
From Schneier on Security

Computer-Assisted Witness Identification

Witnesses are much more accurate at identifying criminals when computers assist in the identification process, not police officers. A major cause of miscarriages...

Don't Let Hacker Inmates Reprogram Prison Computers
From Schneier on Security

Don't Let Hacker Inmates Reprogram Prison Computers

You'd think this would be obvious: Douglas Havard, 27, serving six years for stealing up to

Malware that Forges Bank Statements
From Schneier on Security

Malware that Forges Bank Statements

This is brilliant: The sophisticated hack uses a Trojan horse program installed on the victim's machine that alters html coding before it's displayed in the user's...

UK Defense Security Manual Leaked
From Schneier on Security

UK Defense Security Manual Leaked

Wow. It's over 2,000 pages, so it'll take time to make any sense of. According to Ross Anderson, who's given it a quick look over, "it seems to be the bureaucratic...

Moving Hippos in the Post-9/11 World
From Schneier on Security

Moving Hippos in the Post-9/11 World

It's a security risk: The crate was hoisted onto the flatbed with a 120-ton construction crane. For security reasons, there were no signs on the truck indicating...

Actual DHS Travel Record
From Schneier on Security

Actual DHS Travel Record

If you were curious what the DHS knows about you.  

Friday Squid Blogging: Squid Cartoon
From Schneier on Security

Friday Squid Blogging: Squid Cartoon

Lio.

"Security Theater in New York City"
From Schneier on Security

"Security Theater in New York City"

For the U.N. General Assembly: For those entranced by security theater, New York City is a sight to behold this week. A visit to one of the two centers of the...

Proving a Computer Program's Correctness
From Schneier on Security

Proving a Computer Program's Correctness

This is interesting: Professor Gernot Heiser, the John Lions Chair in Computer Science in the School of Computer Science and Engineering and a senior principal...

Nice Use of Diversion During a Robbery
From Schneier on Security

Nice Use of Diversion During a Robbery

During a daring bank robbery in Sweden that involved a helicopter, the criminals disabled a police helicopter by placing a package with the word "bomb" near the...

Reproducing Keys from Photographs
From Schneier on Security

Reproducing Keys from Photographs

Reproducing keys from distant and angled photographs: Abstract:The access control provided by a physical lock is based on the assumption that the information content...

Immediacy Affects Risk Assessments
From Schneier on Security

Immediacy Affects Risk Assessments

New experiment demonstrates what we already knew: That's because people tend to view their immediate emotions, such as their perceptions of threats or risks, as...

The Doghouse: Crypteto
From Schneier on Security

The Doghouse: Crypteto

Crypteto has a 49,152-bit symmetric key: The most important issue of any encryption product is the 'bit key strength'. To date the strongest known algorithm has...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account