acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Comparing the Security Practices of Experts and Non-Experts
From Schneier on Security

Comparing the Security Practices of Experts and Non-Experts

New paper: "'...no one can hack my mind': Comparing Expert and Non-Expert Security Practices," by Iulia Ion, Rob Reeder, and Sunny Consolvo. Abstract: The state...

The NSA, Metadata, and the Failure of Stopping 9/11
From Schneier on Security

The NSA, Metadata, and the Failure of Stopping 9/11

It's common wisdom that the NSA was unable to intercept phone calls from Khalid al-Mihdhar in San Diego to Bin Ladin in Yemen because of legal restrictions. This...

Fugitive Located by Spotify
From Schneier on Security

Fugitive Located by Spotify

The latest in identification by data: Webber said a tipster had spotted recent activity from Nunn on the Spotify streaming service and alerted law enforcement....

Bizarre High-Tech Kidnapping
From Schneier on Security

Bizarre High-Tech Kidnapping

This is a story of a very high-tech kidnapping: FBI court filings unsealed last week showed how Denise Huskins' kidnappers used anonymous remailers, image sharing...

New RC4 Attack
From Schneier on Security

New RC4 Attack

New research: "All Your Biases Belong To Us: Breaking RC4 in WPA-TKIP and TLS," by Mathy Vanhoef and Frank Piessens: Abstract: We present new biases in RC4, break...

Stagefright Vulnerability in Android Phones
From Schneier on Security

Stagefright Vulnerability in Android Phones

The Stagefright vulnerability for Android phones is a bad one. It's exploitable via a text message (details depend on auto downloading of the particular phone),...

Michael Chertoff Speaks Out Against Backdoors
From Schneier on Security

Michael Chertoff Speaks Out Against Backdoors

This is significant....

Hacking Team's Purchasing of Zero-Day Vulnerabilities
From Schneier on Security

Hacking Team's Purchasing of Zero-Day Vulnerabilities

This is an interesting article that looks at Hacking Team's purchasing of zero-day (0day) vulnerabilities from a variety of sources: Hacking Team's relationships...

Friday Squid Blogging: How a Squid Changes Color
From Schneier on Security

Friday Squid Blogging: How a Squid Changes Color

The California market squid, Doryteuthis opalescens, can manipulate its color in a variety of ways: Reflectins are aptly-named proteins unique to the light-sensing...

How an Amazon Worker Stole iPads
From Schneier on Security

How an Amazon Worker Stole iPads

A worker in Amazon's packaging department figured out how to deliver electronics to himself: Since he was employed with the packaging department, he had easy access...

Remotely Hacking a Car While It's Driving
From Schneier on Security

Remotely Hacking a Car While It's Driving

This is a big deal. Hackers can remotely hack the Uconnect system in cars just by knowing the car's IP address. They can disable the brakes, turn on the AC, blast...

Organizational Doxing of Ashley Madison
From Schneier on Security

Organizational Doxing of Ashley Madison

The -- depending on who is doing the reporting -- cheating, affair, adultery, or infidelity site Ashley Madison has been hacked. The hackers are threatening to...

Malcolm Gladwell on Competing Security Models
From Schneier on Security

Malcolm Gladwell on Competing Security Models

In this essay/review of a book on UK intelligence officer and Soviet spy Kim Philby, Malcolm Gladwell makes this interesting observation: Here we have two very...

Preventing Book Theft in the Middle Ages
From Schneier on Security

Preventing Book Theft in the Middle Ages

Interesting article....

Google's Unguessable URLs
From Schneier on Security

Google's Unguessable URLs

Google secures photos using public but unguessable URLs: So why is that public URL more secure than it looks? The short answer is that the URL is working as a password...

Friday Squid Blogging: Squid Giving Birth
From Schneier on Security

Friday Squid Blogging: Squid Giving Birth

I may have posted this short video before, but if I did, I can't find it. It's four years old, but still pretty to watch. As usual, you can also use this squid...

Using Secure Chat
From Schneier on Security

Using Secure Chat

Micah Lee has a good tutorial on installing and using secure chat. To recap: We have installed Orbot and connected to the Tor network on Android, and we have installed...

ProxyHam Canceled
From Schneier on Security

ProxyHam Canceled

The ProxyHam project (and associated Def Con talk) has been canceled under mysterious circumstances. No one seems to know anything, and conspiracy theories abound...

Crypto-Gram Is Moving
From Schneier on Security

Crypto-Gram Is Moving

If you subscribe to my monthly e-mail newsletter, Crypto-Gram, you need to read this. Sometime between now and the August issue, the Crypto-Gram mailing list will...

Human and Technology Failures in Nuclear Facilities
From Schneier on Security

Human and Technology Failures in Nuclear Facilities

This is interesting: We can learn a lot about the potential for safety failures at US nuclear plants from the July 29, 2012, incident in which three religious activists...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account