acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Identifying People from their Driving Patterns
From Schneier on Security

Identifying People from their Driving Patterns

People can be identified from their "driver fingerprint": ...a group of researchers from the University of Washington and the University of California at San Diego...

Friday Squid Blogging: More Squids
From Schneier on Security

Friday Squid Blogging: More Squids

This research paper shows that the number of squids, and the number of cephalopods in general, has been steadily increasing over the past 60 years: Our analyses...

Skein in FreeBSD
From Schneier on Security

Skein in FreeBSD

The Skein hash function is now part of FreeBSD....

The Unfalsifiability of Security Claims
From Schneier on Security

The Unfalsifiability of Security Claims

Interesting research paper: Cormac Herley, "Unfalsifiability of security claims: There is an inherent asymmetry in computer security: things can be declared insecure...

Suckfly
From Schneier on Security

Suckfly

Suckfly seems to be another Chinese nation-state espionage tool, first stealing South Korean certificates and now attacking Indian networks. Symantec has done a...

Companies Not Saving Your Data
From Schneier on Security

Companies Not Saving Your Data

There's a new trend in Silicon Valley startups; companies are not collecting and saving data on their customers: In Silicon Valley, there's a new emphasis on putting...

Should You Be Allowed to Prevent Drones from Flying Over Your Property?
From Schneier on Security

Should You Be Allowed to Prevent Drones from Flying Over Your Property?

Good debate in the Wall Street Journal. This isn't an obvious one; there are good arguments on both sides....

GCHQ Discloses Two OS X Vulnerabilities to Apple
From Schneier on Security

GCHQ Discloses Two OS X Vulnerabilities to Apple

This is good news: Communications and Electronics Security Group (CESG), the information security arm of GCHQ, was credited with the discovery of two vulnerabilities...

Google Moving Forward on Automatic Logins
From Schneier on Security

Google Moving Forward on Automatic Logins

Google is trying to bring this to Android developers by the end of the year: Today, secure logins -- like those used by banks or in the enterprise environment -...

State of Online Tracking
From Schneier on Security

State of Online Tracking

Really interesting research: "Online tracking: A 1-million-site measurement and analysis," by Steven Englehardt and Arvind Narayanan: Abstract: We present the largest...

Friday Squid Blogging: Squid Kite
From Schneier on Security

Friday Squid Blogging: Squid Kite

Video. Plus an octopus kite, with another squid kite in the background. As usual, you can also use this squid post to talk about the security stories in the news...

Detecting Explosives
From Schneier on Security

Detecting Explosives

Really interesting article on the difficulties involved with explosive detection at airport security checkpoints. Abstract: The mid-air bombing of a Somali passenger...

Identifying People from Their Metadata
From Schneier on Security

Identifying People from Their Metadata

Jonathan Mayer, Patrick Mutchler, and John C. Mitchell, "Evaluating the privacy properties of telephone metadata": Abstract: Since 2013, a stream of disclosures...

Primitive Food Crops and Security
From Schneier on Security

Primitive Food Crops and Security

Economists argue that the security needs of various crops are the cause of civilization size: The argument depends on the differences between how grains and tubers...

More NSA Documents from the Snowden Archive
From Schneier on Security

More NSA Documents from the Snowden Archive

The Intercept is starting to publish a lot more documents. Yesterday they published the first year of an internal newsletter called SIDtoday, along with several...

Unforeseen Costs of Security Training
From Schneier on Security

Unforeseen Costs of Security Training

At the last match of the year for Manchester United, someone found a bomb in a toilet, and security evacuated all 75,000 people and canceled the match. Turns out...

Defeating a Tamper-Proof Bottle
From Schneier on Security

Defeating a Tamper-Proof Bottle

Here's an interesting case of doctored urine-test samples from the Sochi Olympics. Evidence points to someone defeating the tamper-resistance of the bottles: Berlinger...

Friday Squid Blogging: Counterfeit Squid
From Schneier on Security

Friday Squid Blogging: Counterfeit Squid

Goya is facing a $5 million lawsuit; the plaintiff is claiming its canned octopus is really squid. As usual, you can also use this squid post to talk about the...

Scam or Satire?
From Schneier on Security

Scam or Satire?

You decide....

More on the Going Dark Debate
From Schneier on Security

More on the Going Dark Debate

Lawfare is turning out to be the go-to blog for policy wonks about various government debates on cybersecurity. There are two good posts this week on the Going...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account