acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Electromagnetic Weapons
From Schneier on Security

Electromagnetic Weapons

Long article in IEEE Spectrum....

Pencil-and-Paper Codes Used by Central American Criminal Gangs
From Schneier on Security

Pencil-and-Paper Codes Used by Central American Criminal Gangs

No mention of how good the codes are. My guess is not very....

Squid Skin Inspires Eye-Like Photodetector
From Schneier on Security

Squid Skin Inspires Eye-Like Photodetector

Squid are color-blind, but may detect color directly through their skin. A researcher is working on a system to detect colored light the way squid do....

Cell Phone Kill Switches Mandatory in California
From Schneier on Security

Cell Phone Kill Switches Mandatory in California

California passed a kill-switch law, meaning that all cell phones sold in California must have the capability to be remotely turned off. It was sold as an antitheft...

ISIS Threatens US with Terrorism
From Schneier on Security

ISIS Threatens US with Terrorism

They're openly mocking our profiling. But in several telephone conversations with a Reuters reporter over the past few months, Islamic State fighters had indicated...

Hacking Traffic Lights
From Schneier on Security

Hacking Traffic Lights

New paper: "Green Lights Forever: Analyzing the Security of Traffic Infrastructure," Branden Ghena, William Beyer, Allen Hillaker, Jonathan Pevarnek, and J. Alex...

Security Flaws in Rapiscan Full-Body Scanners
From Schneier on Security

Security Flaws in Rapiscan Full-Body Scanners

Security researchers have finally gotten their hands on a Rapiscan backscatter full-body scanner. The results aren't very good. Website with paper and images. News...

Security by Obscurity at Healthcare.gov Site
From Schneier on Security

Security by Obscurity at Healthcare.gov Site

The White House is refusing to release details about the security of healthcare.gov because it might help hackers. What this really means is that the security details...

Eavesdropping Using Smart Phone Gyroscopes
From Schneier on Security

Eavesdropping Using Smart Phone Gyroscopes

The gyroscopes are sensitive enough to pick up acoustic vibrations. It's crude, but it works. Paper. Wired article. Hacker News thread....

The Problems with PGP
From Schneier on Security

The Problems with PGP

Matthew Green has a good post on what's wrong with PGP and what should be done about it....

People Are Not Very Good at Matching Photographs to People
From Schneier on Security

People Are Not Very Good at Matching Photographs to People

We have an error rate of about 15%: Professor Mike Burton, Sixth Century Chair in Psychology at the University of Aberdeen said: "Psychologists identified around...

Friday Squid Blogging: Squid Boats Illuminate Bangkok from Space
From Schneier on Security

Friday Squid Blogging: Squid Boats Illuminate Bangkok from Space

Really: To attract the phytoplankton, fishermen suspend green lights from their boats to illuminate the sea. When the squid chase after their dinner, they're drawn...

Chapter 137 of My Surreal Life
From Schneier on Security

Chapter 137 of My Surreal Life

Someone wrote Sherlock-Schneier fan fiction. Not slash, thank heavens. (And no, that's not an invitation.)...

The Onion on Passwords
From Schneier on Security

The Onion on Passwords

Funny....

Disguising Exfiltrated Data
From Schneier on Security

Disguising Exfiltrated Data

There's an interesting article on a data exfiltration technique. What was unique about the attackers was how they disguised traffic between the malware and command...

The Security of al Qaeda Encryption Software
From Schneier on Security

The Security of al Qaeda Encryption Software

The web intelligence firm Recorded Future has posted two stories about how al Qaeda is using new encryption software in response to the Snowden disclosures. NPR...

US Air Force is Focusing on Cyber Deception
From Schneier on Security

US Air Force is Focusing on Cyber Deception

The US Air Force is focusing on cyber deception next year: Background: Deception is a deliberate act to conceal activity on our networks, create uncertainty and...

QUANTUM Technology Sold by Cyberweapons Arms Manufacturers
From Schneier on Security

QUANTUM Technology Sold by Cyberweapons Arms Manufacturers

Last October, I broke the story about the NSA's top secret program to inject packets into the Internet backbone: QUANTUM. Specifically, I wrote about how QUANTUMINSERT...

NSA/GCHQ/CESC Infecting Innocent Computers Worldwide
From Schneier on Security

NSA/GCHQ/CESC Infecting Innocent Computers Worldwide

There's a new story on the c't magazin website about a 5-Eyes program to infect computers around the world for use as launching pads for attacks. These are not...

Friday Squid Blogging: Te Papa Museum Gets a Second Colossal Squid
From Schneier on Security

Friday Squid Blogging: Te Papa Museum Gets a Second Colossal Squid

That's two more than I have. They're hoping it's a male. As usual, you can also use this squid post to talk about the security stories in the news that I haven't...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account