acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Caller ID Spoofing on the Android
From Schneier on Security

Caller ID Spoofing on the Android

It's easy to access someone else's voicemail by spoofing the caller ID. This isn't new; what is new is that many people now have easy access to caller ID spoofing...

Hemingway Authentication Scheme
From Schneier on Security

Hemingway Authentication Scheme

From 1955, intended as humor: In the future when I should ever call on the telephone to make a request or issue an order I will identify myself as follows: This...

The Chaocipher
From Schneier on Security

The Chaocipher

The Chaocipher is a mechanical encryption algorithm invented in 1918. No one was able to reverse-engineer the algorithm, given sets of plaintexts and ciphertexts...

Serial Killers Are Now Terrorists
From Schneier on Security

Serial Killers Are Now Terrorists

Try to keep up: Leslie Van Houten, a one-time member of Charles Manson's infamous 'family' is up for parole for the 17th time today.... "These are serial killers...

Internet Kill Switch
From Schneier on Security

Internet Kill Switch

Last month, Sen. Joe Lieberman, I-Conn., introduced a bill that might -- we're not really sure -- give the president the authority to shut down all or portionsproposed...

Friday Squid Blogging: Squid Sex Organs
From Schneier on Security

Friday Squid Blogging: Squid Sex Organs

Riddles of squid sex: All cephalopods are hindered by their body shape, which comprises a closed hood-type structure called a mantle, which forms most of what...

TSA Blocks Access to Websites with "Controversial Opinions"
From Schneier on Security

TSA Blocks Access to Websites with "Controversial Opinions"

I wonder if my blog counts.

Detecting Cheating at Colleges
From Schneier on Security

Detecting Cheating at Colleges

The measures used to prevent cheating during tests remind me of casino security measures: No gum is allowed during an exam: chewing could disguise a student

The Toronto 18
From Schneier on Security

The Toronto 18

Long and interesting article from The Toronto Star on the Toronto 18, a terrorist cell arrested in 2006. Lots of stuff in this article I had not read before....

Surveillance and Morality
From Schneier on Security

Surveillance and Morality

"Does Surveillance Make Us Morally Better?": Conclusion The upshot of these reflections is that the relation between surveillance and moral edification is complicated...

The Threat of Cyberwar Has Been Grossly Exaggerated
From Schneier on Security

The Threat of Cyberwar Has Been Grossly Exaggerated

There's a power struggle going on in the U.S. government right now. It's about who is in charge of cyber security, and how much control the government will exert...

"Don't Commit Crime"
From Schneier on Security

"Don't Commit Crime"

This sign is from a gas station in the U.K. My first reaction was to laugh, but then I started thinking about it. We know that signs like "No Shoplifting"...

Research Report on Cyberattack Capabilities
From Schneier on Security

Research Report on Cyberattack Capabilities

From the National Academies in 2009: Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities. It's 390 pages.

Tracking Location Based on Water Isotope Ratios
From Schneier on Security

Tracking Location Based on Water Isotope Ratios

Interesting: ...water molecules differ slightly in their isotope ratios depending on the minerals at their source. ...researchers found that water samples from...

Friday Squid Blogging: Squid Robots
From Schneier on Security

Friday Squid Blogging: Squid Robots

Two of them; one was blogged about last year.

Secret Stash
From Schneier on Security

Secret Stash

Hiding objects in everyday objects.

Vigilant Citizens: Then vs. Now
From Schneier on Security

Vigilant Citizens: Then vs. Now

This is from Atomic Bombing: How to Protect Yourself, published in 1950: Of course, millions of us will go through our lives never seeing a spy or a saboteur...

Cryptography Failure Story
From Schneier on Security

Cryptography Failure Story

By Russian spies: Ricci said the steganographic program was activated by pressing control-alt-E and then typing in a 27-character password, which the FBI found...

Data at Rest vs. Data in Motion
From Schneier on Security

Data at Rest vs. Data in Motion

For a while now, I've pointed out that cryptography is singularly ill-suited to solve the major network security problems of today: denial-of-service attacks, website...

Cryptography Success Story
From Schneier on Security

Cryptography Success Story

From Brazil: the moral, of course, is to choose a strong key and to encrypt the entire drive, not just key files.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account