acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

The Economics of Dueling
From Schneier on Security

The Economics of Dueling

Dueling has a rational economic basis.

Cryptanalysis of the DECT
From Schneier on Security

Cryptanalysis of the DECT

New cryptanalysis of the proprietrary encryption algorithm used in the Digital Enhanced Cordless Telecommunications (DECT) standard for cordless phones. Abstract...

The Effectiveness of Air Marshals
From Schneier on Security

The Effectiveness of Air Marshals

Air marshals are being arrested faster than air marshals are making arrests. Actually, there have been many more arrests of Federal air marshals than that story...

Cryptography Broken on American Military Attack Video
From Schneier on Security

Cryptography Broken on American Military Attack Video

Any ideas? At a news conference at the National Press Club, WikiLeaks said it had acquired the video from whistle-blowers in the military and viewed it after breaking...

New York and the Moscow Subway Bombing
From Schneier on Security

New York and the Moscow Subway Bombing

People intent on preventing a Moscow-style terrorist attack against the New York subway system are proposing a range of expensive new underground security measures...

Bypassing the Chain on Hotel-Room Doors
From Schneier on Security

Bypassing the Chain on Hotel-Room Doors

Technique, plus video.

Privacy and Control
From Schneier on Security

Privacy and Control

In January, Facebook Chief Executive, Mark Zuckerberg, declared the age of privacy to be over. A month earlier, Google Chief Eric Schmidt expressed a similar sentiment...

Detecting Being Watched
From Schneier on Security

Detecting Being Watched

This seems like science fiction to me: The camera uses the same "red eye" effect of from camera flashes to project it hundreds of meters, allowing it to identify...

"Protecting Europe Against Large-Scale Cyber-Attacks"
From Schneier on Security

"Protecting Europe Against Large-Scale Cyber-Attacks"

Report from the House of Lords in the UK (pdf version).

Friday Squid Blogging: Squid Confit
From Schneier on Security

Friday Squid Blogging: Squid Confit

Looks tasty.

iPhone Secret Decoder Ring
From Schneier on Security

iPhone Secret Decoder Ring

It'll protect your secrets from your kid sister, unless she's smarter than that. Looks cool, though.

DHS Cybersecurity Awareness Campaign Challenge
From Schneier on Security

DHS Cybersecurity Awareness Campaign Challenge

This is a little hokey, but better them than the NSA: The National Cybersecurity Awareness Campaign Challenge Competition is designed to solicit ideas from industry...

Explosive Breast Implants -- Not an April Fool's Joke
From Schneier on Security

Explosive Breast Implants -- Not an April Fool's Joke

Is MI5 playing a joke on us? Female homicide bombers are being fitted with exploding breast implants which are almost impossible to detect, British spies havecould...

Fifth Annual Movie-Plot Threat Contest
From Schneier on Security

Fifth Annual Movie-Plot Threat Contest

Once upon a time, men and women throughout the land lived in fear. This caused them to do foolish things that made them feel better temporarily, but didn't make...

Security Cameras in the New York City Subways
From Schneier on Security

Security Cameras in the New York City Subways

The New York Times has an article about cameras in the subways. The article is all about how horrible it is that the cameras don't work: Moreover, nearly half...

Should the Government Stop Outsourcing Code Development?
From Schneier on Security

Should the Government Stop Outsourcing Code Development?

Information technology is increasingly everywhere, and it's the same technologies everywhere. The same operating systems are used in corporate and government computers...

Leaders Make Better Liars
From Schneier on Security

Leaders Make Better Liars

According to new research: The researchers found that subjects assigned leadership roles were buffered from the negative effects of lying. Across all measures,...

Jeremy Clarkson on Security Guards
From Schneier on Security

Jeremy Clarkson on Security Guards

Nice essay: Of course, we know why he's really there. He's really there so that if the bridge is destroyed by terrorists, the authorities can appear on the television...

Master Thief
From Schneier on Security

Master Thief

The amazing story of Gerald Blanchard. Thorough as ever, Blanchard had spent many previous nights infiltrating the bank to do recon or to tamper with the locks...

Identifying People by their Bacteria
From Schneier on Security

Identifying People by their Bacteria

A potential new forensic: To determine how similar a person's fingertip bacteria are to bacteria left on computer keys, the team took swabs from three computer...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account