acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

New Attacks on CAPTCHAs
From Schneier on Security

New Attacks on CAPTCHAs

Nice research: Abstract: We report a novel attack on two CAPTCHAs that have been widely deployed on the Internet, one being Google's home design and the other...

U.S. Drones Have a Computer Virus
From Schneier on Security

U.S. Drones Have a Computer Virus

You'd think we would be more careful than this: A computer virus has infected the cockpits of America

Friday Squid Blogging: Hundreds of Squid Wash Up on Southern California Beaches
From Schneier on Security

Friday Squid Blogging: Hundreds of Squid Wash Up on Southern California Beaches

Humboldt squid are washing up on beaches across Southern California. Seems like it's no big deal; the squid just swam too close to shore.

Security Seals on Voting Machines
From Schneier on Security

Security Seals on Voting Machines

Related to this blog post from Wednesday, here's a paper that looks at security seals on voting machines. Andrew W. Appel, "Security Seals on Voting Machines:...

Dilbert on Security Standards
From Schneier on Security

Dilbert on Security Standards

So true (the predecessor).

FBI-Sponsored Backdoors
From Schneier on Security

FBI-Sponsored Backdoors

From a review of Susan Landau's Surveillance or Security?: To catch up with the new technologies of malfeasance, FBI director Robert Mueller traveled to Silicon...

Status Report: <i>Liars and Outliers</i>
From Schneier on Security

Status Report: Liars and Outliers

Last weekend, I completely reframed the book. I realized that the book isn't about security. It's about trust. I'm writing about how society induces people to...

Insider Attack Against Diebold Voting Machines
From Schneier on Security

Insider Attack Against Diebold Voting Machines

This is both news and not news: Indeed, the Argonne team's attack required no modification, reprogramming, or even knowledge, of the voting machine's proprietary...

Security Cartoon
From Schneier on Security

Security Cartoon

Nice cartoon on the problems of content filtering.

National Cybersecurity Awareness Month
From Schneier on Security

National Cybersecurity Awareness Month

October is National Cybersecurity Awareness Month, sponsored by the Department of Homeland Security. The website has some sample things you can do to to celebrate...

Isaac Asimov on Security Theater
From Schneier on Security

Isaac Asimov on Security Theater

A great find: In his 1956 short story, "Let's Get Together," Isaac Asimov describes security measures proposed to counter a terrorist threat: "Consider further...

HTC Android Vulnerability
From Schneier on Security

HTC Android Vulnerability

Custom HTC firmware breaks standard permissions and allows rogue apps to access location, address book, and account info without authorization.

Friday Squid Blogging: Interesting Squid Recipes
From Schneier on Security

Friday Squid Blogging: Interesting Squid Recipes

Plus a slide show of pretty dishes.

Insecure Chrome Extensions
From Schneier on Security

Insecure Chrome Extensions

An analysis of extensions to the Chrome browser shows that 25% of them are insecure: We reviewed 100 Chrome extensions and found that 27 of the 100 extensions...

Making Fake ATMs Using 3D Printers
From Schneier on Security

Making Fake ATMs Using 3D Printers

One group stole $400K.

Problems with Mac OS X Lion Passwords
From Schneier on Security

Problems with Mac OS X Lion Passwords

Seems like some dumb mistakes. News article.

Tor Arms Race
From Schneier on Security

Tor Arms Race

Iran blocks Tor, and Tor releases a workaround on the same day. How did the filter work technically? Tor tries to make its traffic look like a web browser talking...

Friday Squid Blogging: Sex Life of Deep-Sea Squid
From Schneier on Security

Friday Squid Blogging: Sex Life of Deep-Sea Squid

There's evidence of indiscriminate fertilization in deep-sea squid. They mate with any other squid the encounter, male or female. This unusual behaviour, they...

Man-in-the-Middle Attack Against SSL 3.0/TLS 1.0
From Schneier on Security

Man-in-the-Middle Attack Against SSL 3.0/TLS 1.0

It's the Browser Exploit Against SSL/TLS Tool, or BEAST: The tool is based on a blockwise-adaptive chosen-plaintext attack, a man-in-the-middle approach that injects...

Three Emerging Cyber Threats
From Schneier on Security

Three Emerging Cyber Threats

On Monday I participated a panel at the Information Systems Forum in Berlin. The moderator asked us what the top three emerging threats were in cyberspace. I...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account