acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Detecting Lies through Mouse Movements
From Schneier on Security

Detecting Lies through Mouse Movements

Interesting research: "The detection of faked identity using unexpected questions and mouse dynamics," by Merulin Monaro, Luciano Gamberini, and Guiseppe Sartori...

Font Steganography
From Schneier on Security

Font Steganography

Interesting research in steganography at the font level....

Supermarket Shoplifting
From Schneier on Security

Supermarket Shoplifting

The rise of self-checkout has caused a corresponding rise in shoplifting....

Another Spectre-Like CPU Vulnerability
From Schneier on Security

Another Spectre-Like CPU Vulnerability

Google and Microsoft researchers have disclosed another Spectre-like CPU side-channel vulnerability, called "Speculative Store Bypass." Like the others, the fix...

Japan's Directorate for Signals Intelligence
From Schneier on Security

Japan's Directorate for Signals Intelligence

The Intercept has a long article on Japan's equivalent of the NSA: the Directorate for Signals Intelligence. Interesting, but nothing really surprising. The directorate...

Friday Squid Blogging: Flying Squid
From Schneier on Security

Friday Squid Blogging: Flying Squid

Flying squid are real. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines...

Maliciously Changing Someone's Address
From Schneier on Security

Maliciously Changing Someone's Address

Someone changed the address of UPS corporate headquarters to his own apartment in Chicago. The company discovered it three months later. The problem, of course,...

White House Eliminates Cybersecurity Position
From Schneier on Security

White House Eliminates Cybersecurity Position

The White House has eliminated the cybersecurity coordinator position. This seems like a spectacularly bad idea....

Accessing Cell Phone Location Information
From Schneier on Security

Accessing Cell Phone Location Information

The New York Times is reporting about a company called Securus Technologies that gives police the ability to track cell phone locations without a warrant: The service...

Sending Inaudible Commands to Voice Assistants
From Schneier on Security

Sending Inaudible Commands to Voice Assistants

Researchers have demonstrated the ability to send inaudible commands to voice assistants like Alexa, Siri, and Google Assistant. Over the last two years, researchers...

Details on a New PGP Vulnerability
From Schneier on Security

Details on a New PGP Vulnerability

A new PGP vulnerability was announced today. Basically, the vulnerability makes use of the fact that modern e-mail programs allow for embedded HTML objects. Essentially...

Critical PGP Vulnerability
From Schneier on Security

Critical PGP Vulnerability

EFF is reporting that a critical vulnerability has been discovered in PGP and S/MIME. No details have been published yet, but one of the researchers wrote: We'll...

Friday Squid Blogging: How the Squid Lost Its Shell
From Schneier on Security

Friday Squid Blogging: How the Squid Lost Its Shell

Squids used to have shells. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting...

Airline Ticket Fraud
From Schneier on Security

Airline Ticket Fraud

New research: "Leaving on a jet plane: the trade in fraudulently obtained airline tickets:" Abstract: Every day, hundreds of people fly on airline tickets that...

Supply-Chain Security
From Schneier on Security

Supply-Chain Security

Earlier this month, the Pentagon stopped selling phones made by the Chinese companies ZTE and Huawei on military bases because they might be used to spy on their...

Virginia Beach Police Want Encrypted Radios
From Schneier on Security

Virginia Beach Police Want Encrypted Radios

This article says that the Virginia Beach police are looking to buy encrypted radios. Virginia Beach police believe encryption will prevent criminals from listening...

The US Is Unprepared for Election-Related Hacking in 2018
From Schneier on Security

The US Is Unprepared for Election-Related Hacking in 2018

This survey and report is not surprising: The survey of nearly forty Republican and Democratic campaign operatives, administered through November and December 2017...

Ray Ozzie's Encryption Backdoor
From Schneier on Security

Ray Ozzie's Encryption Backdoor

Last month, Wired published a long article about Ray Ozzie and his supposed new scheme for adding a backdoor in encrypted devices. It's a weird article. It paints...

Friday Squid Blogging: US Army Developing 3D-Printable Battlefield Robot Squid
From Schneier on Security

Friday Squid Blogging: US Army Developing 3D-Printable Battlefield Robot Squid

The next major war will be super weird. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my...

Detecting Laptop Tampering
From Schneier on Security

Detecting Laptop Tampering

Micah Lee ran a two-year experiment designed to detect whether or not his laptop was ever tampered with. The results are inconclusive, but demonstrate how difficult...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account