acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

DDOS for Profit
From Schneier on Security

DDOS for Profit

Brian Krebs reports that the Israeli DDOS service vDOS has earned $600K in the past two years. The information was obtained from a hack and data dump of the company's...

Apple's Cloud Key Vault
From Schneier on Security

Apple's Cloud Key Vault

Ever since Ian Kristi, Apple's Head of Security Engineering and Architecture, presented the company's key backup technology at Black Hat 2016, people have been...

Talk by the Former Head of French SIGINT
From Schneier on Security

Talk by the Former Head of French SIGINT

For former head of French SIGINT gave a talk (removed from YouTube where he talked about a lot of things he probably shouldn't have. If anyone has 1) a transcript...

Internet Disinformation Service for Hire
From Schneier on Security

Internet Disinformation Service for Hire

Yet another leaked catalog of Internet attack services, this one specializing in disinformation: But Aglaya had much more to offer, according to its brochure. For...

Spy Equipment from Cobham
From Schneier on Security

Spy Equipment from Cobham

The Intercept has published a 120-page catalog of spy gear from the British defense company Cobham. This is equipment available to police forces. The catalog was...

Friday Squid Blogging: Korean Spicy Grilled Squid
From Schneier on Security

Friday Squid Blogging: Korean Spicy Grilled Squid

Easy recipe. You can get the red pepper flakes and red pepper paste at most grocery stores. As usual, you can also use this squid post to talk about the security...

Cybercrime as a Tax on the Internet Economy
From Schneier on Security

Cybercrime as a Tax on the Internet Economy

I was reading this 2014 McAfee report on the economic impact of cybercrime, and came across this interesting quote on how security is a tax on the Internet economy...

NSO Group
From Schneier on Security

NSO Group

We're starting to see some information on the Israeli cyber-weapons arms manufacturer that sold the iPhone zero-day exploit to the United Arab Emirates so they...

Using Wi-Fi Signals to Identify People by Body Shape
From Schneier on Security

Using Wi-Fi Signals to Identify People by Body Shape

Another paper on using Wi-Fi for surveillance. This one is on identifying people by their body shape. "FreeSense:Indoor Human Identification with WiFi Signals":...

Keystroke Recognition from Wi-Fi Distortion
From Schneier on Security

Keystroke Recognition from Wi-Fi Distortion

This is interesting research: "Keystroke Recognition Using WiFi Signals." Basically, the user's hand positions as they type distorts the Wi-Fi signal in predictable...

iPhone Zero-Day Used by UAE Government
From Schneier on Security

iPhone Zero-Day Used by UAE Government

Last week, Apple issued a critical security patch for the iPhone: iOS 9.3.5. The incredible story is that this patch is the result of investigative work by Citizen...

Apple Patents Collecting Biometric Information Based on Unauthorized Device Use
From Schneier on Security

Apple Patents Collecting Biometric Information Based on Unauthorized Device Use

Apple received a patent earlier this year on collecting biometric information of an unauthorized device user. The obvious application is taking a copy of the fingerprint...

Friday Squid Blogging: Self-Repairing Fabrics Based on Squid Teeth
From Schneier on Security

Friday Squid Blogging: Self-Repairing Fabrics Based on Squid Teeth

Really: As shown in the video below, researchers at Pennsylvania State University recently developed a polyelectrolyte liquid solution made of bacteria and yeast...

Collision Attacks Against 64-Bit Block Ciphers
From Schneier on Security

Collision Attacks Against 64-Bit Block Ciphers

We've long known that 64 bits is too small for a block cipher these days. That's why new block ciphers like AES have 128-bit, or larger, block sizes. The insecurity...

The NSA is Hoarding Vulnerabilities
From Schneier on Security

The NSA is Hoarding Vulnerabilities

The National Security Agency is lying to us. We know that because of data stolen from an NSA server was dumped on the internet. The agency is hoarding information...

Confusing Security Risks with Moral Judgments
From Schneier on Security

Confusing Security Risks with Moral Judgments

Interesting research that shows we exaggerate the risks of something when we find it morally objectionable. From an article about and interview with the researchers...

Interesting Internet-Based Investigative Techniques
From Schneier on Security

Interesting Internet-Based Investigative Techniques

In this article, detailing the Australian and then worldwide investigation of a particularly heinous child-abuse ring, there are a lot of details of the pedophile...

Privacy Implications of Windows 10
From Schneier on Security

Privacy Implications of Windows 10

The EFF has a good analysis of all the ways Windows 10 violates your privacy....

Research on the Timing of Security Warnings
From Schneier on Security

Research on the Timing of Security Warnings

fMRI experiments show that we are more likely to ignore security warnings when they interrupt other tasks. A new study from BYU, in collaboration with Google Chrome...

Terrorist False Alarm at JFK Airport Demonstrates How Unprepared We Really Are
From Schneier on Security

Terrorist False Alarm at JFK Airport Demonstrates How Unprepared We Really Are

The detailed accounts of the terrorist-shooter false-alarm at Kennedy Airport in New York last week illustrate how completely and totally unprepared the airport...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account