acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Jamming Wi-Fi
From Schneier on Security

Jamming Wi-Fi

It's both easy and cheap. Slashdot thread....

Soviet Spying on US Selectric Typewriters
From Schneier on Security

Soviet Spying on US Selectric Typewriters

In the 19980s, the Soviet Union bugged the IBM Selectric typewriters in the U.S. Embassy in Moscow. This NSA document discusses how the US discovered the bugs and...

NSA Patents
From Schneier on Security

NSA Patents

Details on the patents issued to the NSA....

Friday Squid Blogging: Japanese Squid Recipe
From Schneier on Security

Friday Squid Blogging: Japanese Squid Recipe

Delicious recipe of squid with cabbage, bean sprouts, and noodles. As usual, you can also use this squid post to talk about the security stories in the news that...

I'm a Guest on "Adam Ruins Everything"
From Schneier on Security

I'm a Guest on "Adam Ruins Everything"

The show is about security theater. I am a disembodied head on a scooter. Here's a teaser. Here's the full episode (for pay, but cheap). The scooter idea was a...

SHA-1 Freestart Collision
From Schneier on Security

SHA-1 Freestart Collision

There's a new cryptanalysis result against the hash function SHA-1: Abstract: We present in this article a freestart collision example for SHA-1, i.e., a collision...

Information in Your Boarding Pass's Bar Code
From Schneier on Security

Information in Your Boarding Pass's Bar Code

There's a lot of information, including the ability to get even more information....

European Court of Justice Rules Against Safe Harbor
From Schneier on Security

European Court of Justice Rules Against Safe Harbor

The European Court of Justice ruled that sending personal data to the US violates their right to privacy: The ruling, by the European Court of Justice, said the...

Autonomous Vehicles as Bombs
From Schneier on Security

Autonomous Vehicles as Bombs

Good discussion of the issues. Now we need to think about solutions....

Automatic Face Recognition and Surveillance
From Schneier on Security

Automatic Face Recognition and Surveillance

ID checks were a common response to the terrorist attacks of 9/11, but they'll soon be obsolete. You won't have to show your ID, because you'll be identified automatically...

Friday Squid Blogging: Bobtail Squid Keeps Bacteria to Protect Its Eggs
From Schneier on Security

Friday Squid Blogging: Bobtail Squid Keeps Bacteria to Protect Its Eggs

The Hawaiian Bobtail Squid deposits bacteria on its eggs to keep them safe. As usual, you can also use this squid post to talk about the security stories in the...

Resilient Systems News
From Schneier on Security

Resilient Systems News

Former Raytheon chief scientist Bill Swanson has joined our board of directors. For those who don't know, Resilient Systems is my company. I'm the CTO, and we sell...

Stealing Fingerprints
From Schneier on Security

Stealing Fingerprints

The news from the Office of Personnel Management hack keeps getting worse. In addition to the personal records of over 20 million US government employees, we've...

Existential Risk and Technological Advancement
From Schneier on Security

Existential Risk and Technological Advancement

AI theorist Eliezer Yudkowsky: "Every eighteen months, the minimum IQ necessary to destroy the world drops by one point." Oh, how I wish I said that....

Identifying CIA Officers in the Field
From Schneier on Security

Identifying CIA Officers in the Field

During the Cold War, the KGB was very adept at identifying undercover CIA officers in foreign countries through what was basically big data analysis. (Yes, this...

Spoofing Fitness Trackers
From Schneier on Security

Spoofing Fitness Trackers

The website Unfitbits.com has a series of instructional videos on how to spoof fitness trackers, using such things as a metronome, pendulum, or power drill. With...

Volkswagen and Cheating Software
From Schneier on Security

Volkswagen and Cheating Software

For the past six years, Volkswagen has been cheating on the emissions testing for its diesel cars. The cars' computers were able to detect when they were being...

How GCHQ Tracks Internet Users
From Schneier on Security

How GCHQ Tracks Internet Users

The Intercept has a new story from the Snowden documents about The UK's GCHQ's surveillance of the Internet: The mass surveillance operation ­ code-named KARMA...

Good Article on the Sony Attack
From Schneier on Security

Good Article on the Sony Attack

Fortune has a three-part article on the Sony attack by North Korea. There's not a lot of tech here; it's mostly about Sony's internal politics regarding the movie...

Friday Squid Blogging: Disney's Minigame Squid Wars
From Schneier on Security

Friday Squid Blogging: Disney's Minigame Squid Wars

It looks like a Nintendo game. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account