acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Pirates Hack into Shipping Company's Database
From Schneier on Security

Pirates Hack into Shipping Company's Database

A group of pirates -- the real kind -- determined which cargo to steal by hacking into a shipping company's database. Here's the report....

Cheating at Professional Bridge
From Schneier on Security

Cheating at Professional Bridge

Interesting article on detecting cheaters in professional bridge using big-data analysis. Basically, a big part of the game is the communication of information...

Interesting Research on the Economics of Privacy
From Schneier on Security

Interesting Research on the Economics of Privacy

New paper: "The Economics of Privacy, by Alessandro Acquisti, Curtis R. Taylor, and Liad Wagman: Abstract: This article summarizes and draws connections among diverse...

Friday Squid Blogging: Whale Mistaken for Squid
From Schneier on Security

Friday Squid Blogging: Whale Mistaken for Squid

A purported giant squid that washed up on the shore in Norfolk, England, is actually a minke whale. As usual, you can also use this squid post to talk about the...

Sabotaging Bicycle Racks
From Schneier on Security

Sabotaging Bicycle Racks

This is the first time I've heard of this clever hack. Bicycle thieves saw through a bicycle rack and then tape it back together, so unsuspecting people chain their...

Data Is a Toxic Asset
From Schneier on Security

Data Is a Toxic Asset

Thefts of personal information aren't unusual. Every week, thieves break into networks and steal data about people, often tens of millions at a time. Most of the...

DROWN Attack
From Schneier on Security

DROWN Attack

Earlier this week, we learned of yet another attack against SSL/TLS where an attacker can force people to use insecure algorithms. It's called DROWN. Here's a good...

Security Vulnerabilities in Wireless Keyboards
From Schneier on Security

Security Vulnerabilities in Wireless Keyboards

Many wireless keyboards have a security vulnerability that allow someone to hack the computer using the keyboard-computer link. (Technical details here.) An attacker...

The Mathematics of Conspiracy
From Schneier on Security

The Mathematics of Conspiracy

This interesting study tries to build a mathematical model for the continued secrecy of conspiracies, and tries to predict how long before they will be revealed...

Company Tracks Iowa Caucusgoers by their Cell Phones
From Schneier on Security

Company Tracks Iowa Caucusgoers by their Cell Phones

It's not just governments. Companies like Dstillery are doing this too: "We watched each of the caucus locations for each party and we collected mobile device ID's...

WikiLeaks Publishes NSA Target List
From Schneier on Security

WikiLeaks Publishes NSA Target List

As part of an ongoing series of classified NSA target list and raw intercepts, WikiLeaks published details of the NSA's spying on UN Secretary General Ban Ki-Moon...

Lots More Writing about the FBI vs. Apple
From Schneier on Security

Lots More Writing about the FBI vs. Apple

I have written two posts on the case, and at the bottom of those essays are lots of links to other essays written by other people. Here are more links. If you read...

Resilient Systems News: IBM to Buy Resilient Systems
From Schneier on Security

Resilient Systems News: IBM to Buy Resilient Systems

Today, IBM announced its intention to purchase my company, Resilient Systems. (Yes, the rumors were basically true.) I think this is a great development for Resilient...

More on the "Data as Exhaust" Metaphor
From Schneier on Security

More on the "Data as Exhaust" Metaphor

Research paper: Gavin J.D. Smith, "Surveillance, Data and Embodiment: On the Work of Being Watched," Body and Society, January 2016. Abstract: Today's bodies are...

Friday Squid Blogging: Energy Converter Inspired by Squid
From Schneier on Security

Friday Squid Blogging: Energy Converter Inspired by Squid

Engineers have invented a wave energy converter that works in the same way that squid propel themselves through the water. As usual, you can also use this squid...

Notice and Consent
From Schneier on Security

Notice and Consent

New Research: Rebecca Lipman, "Online Privacy and the Invisible Market for Our Data." The paper argues that notice and consent doesn't work, and suggests how is...

Thinking about Intimate Surveillance
From Schneier on Security

Thinking about Intimate Surveillance

Law Professor Karen Levy writes about the rise of surveillance in our most intimate activities -- love, sex, romance -- and how it affects those activities. This...

Simultaneous Discovery of Vulnerabilities
From Schneier on Security

Simultaneous Discovery of Vulnerabilities

In the conversation about zero-day vulnerabilities and whether "good" governments should disclose or hoard vulnerabilities, one of the critical variables is independent...

The Importance of Strong Encryption to Security
From Schneier on Security

The Importance of Strong Encryption to Security

Encryption keeps you safe. Encryption protects your financial details and passwords when you bank online. It protects your cell phone conversations from eavesdroppers...

Eavesdropping by the Foscam Security Camera
From Schneier on Security

Eavesdropping by the Foscam Security Camera

Brian Krebs has a really weird story about the build-in eavesdropping by the Chinese-made Foscam security camera: Imagine buying an internet-enabled surveillance...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account