acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Detecting Laptop Tampering
From Schneier on Security

Detecting Laptop Tampering

Micah Lee ran a two-year experiment designed to detect whether or not his laptop was ever tampered with. The results are inconclusive, but demonstrate how difficult...

LC4: Another Pen-and-Paper Cipher
From Schneier on Security

LC4: Another Pen-and-Paper Cipher

Interesting symmetric cipher: LC4: Abstract: ElsieFour (LC4) is a low-tech cipher that can be computed by hand; but unlike many historical ciphers, LC4 is designed...

NIST Issues Call for "Lightweight Cryptography" Algorithms
From Schneier on Security

NIST Issues Call for "Lightweight Cryptography" Algorithms

This is interesting: Creating these defenses is the goal of NIST's lightweight cryptography initiative, which aims to develop cryptographic algorithm standards...

IoT Inspector Tool from Princeton
From Schneier on Security

IoT Inspector Tool from Princeton

Researchers at Princeton University have released IoT Inspector, a tool that analyzes the security and privacy of IoT devices by examining the data they send across...

Security Vulnerabilities in VingCard Electronic Locks
From Schneier on Security

Security Vulnerabilities in VingCard Electronic Locks

Researchers have disclosed a massive vulnerability in the VingCard eletronic lock system, used in hotel rooms around the world: With a $300 Proxmark RFID card reading...

Friday Squid Blogging: Bizarre Contorted Squid
From Schneier on Security

Friday Squid Blogging: Bizarre Contorted Squid

This bizarre contorted squid might be a new species, or a previously known species exhibiting a new behavior. No one knows. As usual, you can also use this squid...

TSB Bank Disaster
From Schneier on Security

TSB Bank Disaster

This seems like an absolute disaster: The very short version is that a UK bank, TSB, which had been merged into and then many years later was spun out of Lloyds...

New NSA/Cyber Command Head Confirmed by Senate
From Schneier on Security

New NSA/Cyber Command Head Confirmed by Senate

It's Lt. Gen. Paul Nakasone. I know nothing about him....

Two NSA Algorithms Rejected by the ISO
From Schneier on Security

Two NSA Algorithms Rejected by the ISO

The ISO has rejected two symmetric encryption algorithms: SIMON and SPECK. These algorithms were both designed by the NSA and made public in 2013. They are optimized...

Baseball Code
From Schneier on Security

Baseball Code

Info on the coded signals used by the Colorado Rockies....

Computer Alarm that Triggers When Lid Is Opened
From Schneier on Security

Computer Alarm that Triggers When Lid Is Opened

"Do Not Disturb" is a Macintosh app that send an alert when the lid is opened. The idea is to detect computer tampering. Wire article: Do Not Disturb goes a step...

Russia is Banning Telegram
From Schneier on Security

Russia is Banning Telegram

Russia has banned the secure messaging app Telegram. It's making an absolute mess of the ban -- blocking 16 million IP addresses, many belonging to the Amazon and...

Yet Another Biometric: Ear Shape
From Schneier on Security

Yet Another Biometric: Ear Shape

This acoustic technology identifies individuals by their ear shapes. No information about either false positives or false negatives....

Friday Squid Blogging: Squid Prices Rise as Catch Decreases
From Schneier on Security

Friday Squid Blogging: Squid Prices Rise as Catch Decreases

In Japan: Last year's haul sank 15% to 53,000 tons, according to the JF Zengyoren national federation of fishing cooperatives. The squid catch has fallen by half...

Securing Elections
From Schneier on Security

Securing Elections

Elections serve two purposes. The first, and obvious, purpose is to accurately choose the winner. But the second is equally important: to convince the loser. To...

Lifting a Fingerprint from a Photo
From Schneier on Security

Lifting a Fingerprint from a Photo

Police in the UK were able to read a fingerprint from a photo of a hand: Staff from the unit's specialist imaging team were able to enhance a picture of a hand...

Oblivious DNS
From Schneier on Security

Oblivious DNS

Interesting idea: ...we present Oblivious DNS (ODNS), which is a new design of the DNS ecosystem that allows current DNS servers to remain unchanged and increases...

Hijacking Emergency Sirens
From Schneier on Security

Hijacking Emergency Sirens

Turns out it's easy to hijack emergency sirens with a radio transmitter....

The DMCA and its Chilling Effects on Research
From Schneier on Security

The DMCA and its Chilling Effects on Research

The Center for Democracy and Technology has a good summary of the current state of the DMCA's chilling effects on security research. To underline the nature of...

Friday Squid Blogging: Eating Firefly Squid
From Schneier on Security

Friday Squid Blogging: Eating Firefly Squid

In Tokama, Japan, you can watch the firefly squid catch and eat them in various ways: "It's great to eat hotaruika around when the seasons change, which is when...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account