acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

North Korea ATM Hack
From Schneier on Security

North Korea ATM Hack

The US Cybersecurity and Infrastructure Security Agency (CISA) published a long and technical alert describing a North Korea hacking scheme against ATMs in a bunch...

North Korea ATM Hack
From Schneier on Security

North Korea ATM Hack

The US Cybersecurity and Infrastructure Security Agency (CISA) published a long and technical alert describing a North Korea hacking scheme against ATMs in a bunch...

North Korea ATM Hack
From Schneier on Security

North Korea ATM Hack

The US Cybersecurity and Infrastructure Security Agency (CISA) published a long and technical alert describing a North Korea hacking scheme against ATMs in a bunch...

Seny Kamara on "Crypto for the People"
From Schneier on Security

Seny Kamara on "Crypto for the People"

Seny Kamara gave an excellent keynote talk this year at the (online) CRYPTO Conference. He talked about solving real-world crypto problems for marginalized communities...

Seny Kamara on "Crypto for the People"
From Schneier on Security

Seny Kamara on "Crypto for the People"

Seny Kamara gave an excellent keynote talk this year at the (online) CRYPTO Conference. He talked about solving real-world crypto problems for marginalized communities...

Seny Kamara on "Crypto for the People"
From Schneier on Security

Seny Kamara on "Crypto for the People"

Seny Kamara gave an excellent keynote talk this year at the (online) CRYPTO Conference. He talked about solving real-world crypto problems for marginalized communities...

Friday Squid Blogging: How Squid Survive Freezing, Oxygen-Deprived Waters
From Schneier on Security

Friday Squid Blogging: How Squid Survive Freezing, Oxygen-Deprived Waters

Lots of interesting genetic details. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog...

Friday Squid Blogging: How Squid Survive Freezing, Oxygen-Deprived Waters
From Schneier on Security

Friday Squid Blogging: How Squid Survive Freezing, Oxygen-Deprived Waters

Lots of interesting genetic details. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog...

Friday Squid Blogging: How Squid Survive Freezing, Oxygen-Deprived Waters
From Schneier on Security

Friday Squid Blogging: How Squid Survive Freezing, Oxygen-Deprived Waters

Lots of interesting genetic details. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog...

US Postal Service Files Blockchain Voting Patent
From Schneier on Security

US Postal Service Files Blockchain Voting Patent

The US Postal Service has filed a patent on a blockchain voting method: Abstract: A voting system can use the security of blockchain and the mail to provide a reliable...

US Postal Service Files Blockchain Voting Patent
From Schneier on Security

US Postal Service Files Blockchain Voting Patent

The US Postal Service has filed a patent on a blockchain voting method: Abstract: A voting system can use the security of blockchain and the mail to provide a reliable...

US Postal Service Files Blockchain Voting Patent
From Schneier on Security

US Postal Service Files Blockchain Voting Patent

The US Postal Service has filed a patent on a blockchain voting method: Abstract: A voting system can use the security of blockchain and the mail to provide a reliable...

Cory Doctorow on The Age of Surveillance Capitalism
From Schneier on Security

Cory Doctorow on The Age of Surveillance Capitalism

Cory Doctorow has writtten an extended rebuttal of The Age of Surveillance Capitalism by Shoshana Zuboff. He summarized the argument on Twitter. Shorter summary...

Amazon Supplier Fraud
From Schneier on Security

Amazon Supplier Fraud

Interesting story of an Amazon supplier fraud: According to the indictment, the brothers swapped ASINs for items Amazon ordered to send large quantities of different...

Identifying People by Their Browsing Histories
From Schneier on Security

Identifying People by Their Browsing Histories

Interesting paper: "Replication: Why We Still Can't Browse in Peace: On the Uniqueness and Reidentifiability of Web Browsing Histories": We examine the threat to...

DiceKeys
From Schneier on Security

DiceKeys

DiceKeys is a physical mechanism for creating and storing a 192-bit key. The idea is that you roll a special set of twenty-five dice, put them into a plastic jig...

Friday Squid Blogging: Rhode Island's State Appetizer Is Calamari
From Schneier on Security

Friday Squid Blogging: Rhode Island's State Appetizer Is Calamari

Rhode Island has an official state appetizer, and it's calamari. Who knew? As usual, you can also use this squid post to talk about the security stories in the...

Yet Another Biometric: Bioacoustic Signatures
From Schneier on Security

Yet Another Biometric: Bioacoustic Signatures

Sound waves through the body are unique enough to be a biometric: "Modeling allowed us to infer what structures or material features of the human body actually...

Copying a Key by Listening to It in Action
From Schneier on Security

Copying a Key by Listening to It in Action

Researchers are using recordings of keys being used in locks to create copies. Once they have a key-insertion audio file, SpiKey's inference software gets to work...

Using Disinformation to Cause a Blackout
From Schneier on Security

Using Disinformation to Cause a Blackout

Interesting paper: "How weaponizing disinformation can bring down a city's power grid": Abstract: Social media has made it possible to manipulate the masses via...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account