acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Graffiti by Drone
From Schneier on Security

Graffiti by Drone

Drones can graffiti walls that no person can reach. (Note that wired.com blocks ad blockers. My trick is to copy the page and then paste it into my text editor.)...

BlackBerry's Global Encryption Key
From Schneier on Security

BlackBerry's Global Encryption Key

Last week there was a big news story about the Blackberry encryption. The news was that all BlackBerry devices share a global encryption key, and that the Canadian...

Friday Squid Blogging: My Little Cephalopod
From Schneier on Security

Friday Squid Blogging: My Little Cephalopod

I assume this is more amusing to people who know about My Little Pony. As usual, you can also use this squid post to talk about the security stories in the news...

Encryption Backdoor Cartoons
From Schneier on Security

Encryption Backdoor Cartoons

Dilbert has a series: 1, 2, 3, 4, and 5. SMBC. And three more that make it clear this is a security vs. surveillance debate. Also this....

Cheating in Bicycle Races with Tiny Hidden Motors
From Schneier on Security

Cheating in Bicycle Races with Tiny Hidden Motors

If doping weren't enough, cyclists are cheating in races by hiding tiny motors in their bicycles. There are many detection techniques: For its report, Stade 2 positioned...

How Hacking Team Got Hacked
From Schneier on Security

How Hacking Team Got Hacked

The hacker who hacked Hacking Team posted a lengthy description of how he broke into the company and stole everything. Two articles. ETA: This post originally had...

Helen Nissenbaum on Regulating Data Collection and Use
From Schneier on Security

Helen Nissenbaum on Regulating Data Collection and Use

NYU Helen Nissenbaum gave an excellent lecture at Brown University last month, where she rebutted those who think that we should not regulate data collection, only...

GCHQ Gets Involved in Mundane Surveillance Matters
From Schneier on Security

GCHQ Gets Involved in Mundane Surveillance Matters

GCHQ detected a potential pre-publication leak of a Harry Potter book, and alerted the publisher. Is this what British national intelligence is supposed to be doing...

Details about Juniper's Firewall Backdoor
From Schneier on Security

Details about Juniper's Firewall Backdoor

Last year, we learned about a backdoor in Juniper firewalls, one that seems to have been added into the code base. There's now some good research: "A Systematic...

Kuwaiti Government will DNA Test Everyone
From Schneier on Security

Kuwaiti Government will DNA Test Everyone

There's a new law that will enforce DNA testing for everyone: citizens, expatriates, and visitors. They promise that the program "does not include genealogical...

Security Risks of Shortened URLs
From Schneier on Security

Security Risks of Shortened URLs

Shortened URLs, produced by services like bit.ly and goo.gl, can be brute-forced. And searching random shortened URLs yields all sorts of secret documents. Plus...

Friday Squid Blogging: Replicating Reflecting Squid Tissue
From Schneier on Security

Friday Squid Blogging: Replicating Reflecting Squid Tissue

New research. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

IRS Security
From Schneier on Security

IRS Security

Monday is Tax Day. Many of us are thinking about our taxes. Are they too high or too low? What's our money being spent on? Do we have a government worth paying...

Cheating in Marathon Running
From Schneier on Security

Cheating in Marathon Running

Story of Julie Miller, who cheated in multiple triathlon races: The difference between cheating in 1980 and cheating today is that it's much harder to get away...

Smartphone Forensics to Detect Distraction
From Schneier on Security

Smartphone Forensics to Detect Distraction

The company Cellebrite is developing a portable forensics device that would determine if a smartphone user was using the phone at a particular time. The idea is...

Hacking Lottery Machines
From Schneier on Security

Hacking Lottery Machines

Interesting article about how a former security director of the US Multi-State Lottery Association hacked the random-number generator in lottery software so he...

2016 Protocols Workshop
From Schneier on Security

2016 Protocols Workshop

Ross Anderson has liveblogged the 24th International Workshop on Security Protocols in Brno, Czech Republic....

Scams from the 1800s
From Schneier on Security

Scams from the 1800s

They feel quaint today: But in the spring of 1859, folks were concerned about another kind of hustle: A man who went by the name of A.V. Lamartine drifted from...

Friday Squid Blogging: Cooking with Squid Ink
From Schneier on Security

Friday Squid Blogging: Cooking with Squid Ink

Risotto nero and more. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Security Lessons from the Game of Werewolf
From Schneier on Security

Security Lessons from the Game of Werewolf

I can't believe I haven't posted this before....
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account