acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Friday Squid Blogging: Squid Proteins and the Brain-Computer Interface
From Schneier on Security

Friday Squid Blogging: Squid Proteins and the Brain-Computer Interface

There's a protein in squid that might be useful in getting biological circuits to talk to computer circuits. As usual, you can also use this squid post to talk...

Eavesdropping by Visual Vibrations
From Schneier on Security

Eavesdropping by Visual Vibrations

Researchers are able to recover sound through soundproof glass by recording the vibrations of a plastic bag. Researchers at MIT, Microsoft, and Adobe have developed...

Social Engineering a Telemarketer
From Schneier on Security

Social Engineering a Telemarketer

Okay, this is funny....

The US Intelligence Community has a Third Leaker
From Schneier on Security

The US Intelligence Community has a Third Leaker

Ever since The Intercept published this story about the US government's Terrorist Screening Database, the press has been writing about a "second leaker": The Intercept...

Over a Billion Passwords Stolen?
From Schneier on Security

Over a Billion Passwords Stolen?

I've been doing way too many media interviews over this weird New York Times story that a Russian criminal gang has stolen over 1.2 billion passwords. As expected...

Ubiquitous Surveillance in Singapore
From Schneier on Security

Ubiquitous Surveillance in Singapore

Good essay...

SynoLocker Ransomware Demands Bitcoins
From Schneier on Security

SynoLocker Ransomware Demands Bitcoins

Network-attached storage devices made by Synology are being attacked, and their data encrypted, by ransomware that demands $350 in bitcoins (payable anonymously...

Former NSA Director Patenting Computer Security Techniques
From Schneier on Security

Former NSA Director Patenting Computer Security Techniques

Former NSA Director Keith Alexander is patenting a variety of techniques to protect computer networks. We're supposed to believe that he developed these on his...

Friday Squid Blogging: Squid Nebula
From Schneier on Security

Friday Squid Blogging: Squid Nebula

A nebula that looks like a squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

The NSA's Patents
From Schneier on Security

The NSA's Patents

Here are all the NSA's patents, in one searchable database. If you find something good, tell us all in the comments....

The Fundamental Insecurity of USB
From Schneier on Security

The Fundamental Insecurity of USB

This is pretty impressive: Most of us learned long ago not to run executable files from sketchy USB sticks. But old-fashioned USB hygiene can't stop this newer...

Debit Card Override Hack
From Schneier on Security

Debit Card Override Hack

Clever: Parrish allegedly visited Apple Stores and tried to buy products with four different debit cards, which were all closed by his respective financial institutions...

The Costs of NSA Surveillance
From Schneier on Security

The Costs of NSA Surveillance

New America Foundation has a new paper on the costs of NSA surveillance: economic costs to US business, costs to US foreign policy, and costs to security. News...

Conference on Deception
From Schneier on Security

Conference on Deception

There was a conference on deception earlier this month. Sophie Van Der Zee has a summary of the sessions....

Russia Paying for a Tor Break
From Schneier on Security

Russia Paying for a Tor Break

Russia has put out a tender on its official government procurement website for anyone who can identify Tor users. The reward of $114,000 seems pretty cheap for...

Friday Squid Blogging: Build a Squid
From Schneier on Security

Friday Squid Blogging: Build a Squid

An interactive animation from the Museum of New Zealand Te Papa Tongarewa. As usual, you can also use this squid post to talk about the security stories in the...

Building a Legal Botnet in the Cloud
From Schneier on Security

Building a Legal Botnet in the Cloud

Two researchers have built a botnet using free anonymous accounts. They only collected 1,000 accounts, but there's no reason this can't scale to much larger numbers...

Security Vulnerability in the Tails OS
From Schneier on Security

Security Vulnerability in the Tails OS

I'd like more information on this....

Securing the Nest Thermostat
From Schneier on Security

Securing the Nest Thermostat

A group of hackers are using a vulnerability in the Next thermostat to secure it against Nest's remote data collection....

Fingerprinting Computers By Making Them Draw Images
From Schneier on Security

Fingerprinting Computers By Making Them Draw Images

Here's a new way to identify individual computers over the Internet. The page instructs the browser to draw an image. Because each computer draws the image slightly...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account