acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Friday Squid Blogging: Antifungal Squid-Egg Coating
From Schneier on Security

Friday Squid Blogging: Antifungal Squid-Egg Coating

The Hawaiian bobtail squid coats its eggs with antifungal bacteria. As usual, you can also use this squid post to talk about the security stories in the news that...

WPA3
From Schneier on Security

WPA3

Everyone is writing about the new WPA3 Wi-Fi security standard, and how it improves security over the current WPA2 standard. This summary is as good as any other...

Department of Commerce Report on the Botnet Threat
From Schneier on Security

Department of Commerce Report on the Botnet Threat

Last month, the US Department of Commerce released a report on the threat of botnets and what to do about it. I note that it explicitly said that the IoT makes...

Recovering Keyboard Inputs through Thermal Imaging
From Schneier on Security

Recovering Keyboard Inputs through Thermal Imaging

Researchers at the University of California, Irvine, are able to recover user passwords by way of thermal imaging. The tech is pretty straightforward, but it's...

PROPagate Code Injection Seen in the Wild
From Schneier on Security

PROPagate Code Injection Seen in the Wild

Last year, researchers wrote about a new Windows code injection technique called PROPagate. Last week, it was first seen in malware: This technique abuses the SetWindowsSubclass...

Friday Squid Blogging: Squid Unexpectedly Playing a Part in US/China Trade War
From Schneier on Security

Friday Squid Blogging: Squid Unexpectedly Playing a Part in US/China Trade War

Chinese buyers are canceling orders to buy US squid in advance of an expected 25% tariff. As usual, you can also use this squid post to talk about the security...

The NSA's Domestic Surveillance Centers
From Schneier on Security

The NSA's Domestic Surveillance Centers

The Intercept has a long story about the NSA's domestic interception points. Includes some new Snowden documents....

Beating Facial Recognition Software with Face Makeup
From Schneier on Security

Beating Facial Recognition Software with Face Makeup

At least right now, facial recognition algorithms don't work with Juggalo makeup....

California Passes New Privacy Law
From Schneier on Security

California Passes New Privacy Law

The California legislature unanimously passed the strongest data privacy law in the nation. This is great news, but I have a lot of reservations. The Internet tech...

Traffic Analysis of the LTE Mobile Standard
From Schneier on Security

Traffic Analysis of the LTE Mobile Standard

Interesting research in using traffic analysis to learn things about encrypted traffic. It's hard to know how critical these vulnerabilities are. They're very hard...

Friday Squid Blogging: Fried Squid with Turmeric
From Schneier on Security

Friday Squid Blogging: Fried Squid with Turmeric

Good-looking recipe. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines...

Conservation of Threat
From Schneier on Security

Conservation of Threat

Here's some interesting research about how we perceive threats. Basically, as the environment becomes safer we basically manufacture new threats. From an essay...

Manipulative Social Media Practices
From Schneier on Security

Manipulative Social Media Practices

The Norwegian Consumer Council just published an excellent report on the deceptive practices tech companies use to trick people into giving up their privacy. From...

IEEE Statement on Strong Encryption vs. Backdoors
From Schneier on Security

IEEE Statement on Strong Encryption vs. Backdoors

The IEEE came out in favor of strong encryption: IEEE supports the use of unfettered strong encryption to protect confidentiality and integrity of data and communications...

Bypassing Passcodes in iOS
From Schneier on Security

Bypassing Passcodes in iOS

Last week, a story was going around explaining how to brute-force an iOS password. Basically, the trick was to plug the phone into an external keyboard and trying...

Secure Speculative Execution
From Schneier on Security

Secure Speculative Execution

We're starting to see research into designing speculative execution systems that avoid Spectre- and Meltdown-like security problems. Here's one. I don't know if...

Friday Squid Blogging: Capturing the Giant Squid on Video
From Schneier on Security

Friday Squid Blogging: Capturing the Giant Squid on Video

In this 2013 TED talk, oceanographer Edith Widder explains how her team captured the giant squid on video. As usual, you can also use this squid post to talk about...

The Effects of Iran's Telegram Ban
From Schneier on Security

The Effects of Iran's Telegram Ban

The Center for Human Rights in Iran has released a report outlining the effect's of that country's ban on Telegram, a secure messaging app used by about half of...

Domain Name Stealing at Gunpoint
From Schneier on Security

Domain Name Stealing at Gunpoint

I missed this story when it came around last year: someone tried to steal a domain name at gunpoint. He was just sentenced to 20 years in jail....

Algeria Shut Down the Internet to Prevent Students from Cheating on Exams
From Schneier on Security

Algeria Shut Down the Internet to Prevent Students from Cheating on Exams

Algeria shut the Internet down nationwide to prevent high-school students from cheating on their exams. The solution in New South Wales, Australia was to ban smartphones...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account