acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Do the Police Need a Search Warrant to Access Cell Phone Location Data?
From Schneier on Security

Do the Police Need a Search Warrant to Access Cell Phone Location Data?

The US Supreme Court is deciding a case that will establish whether the police need a warrant to access cell phone location data. This week I signed on to an amicus...

Hacking a Gene Sequencer by Encoding Malware in a DNA Strand
From Schneier on Security

Hacking a Gene Sequencer by Encoding Malware in a DNA Strand

One of the common ways to hack a computer is to mess with its input data. That is, if you can feed the computer data that it interprets -- or misinterprets -- in...

Bank Robbery Tactic
From Schneier on Security

Bank Robbery Tactic

This video purports to be a bank robbery in Kiev. He first threatens a teller, who basically ignores him because she's behind bullet-proof glass. But then the robber...

Friday Squid Blogging: Squid Eyeballs
From Schneier on Security

Friday Squid Blogging: Squid Eyeballs

Details on how a squid's eye corrects for underwater distortion: Spherical lenses, like the squids', usually can't focus the incoming light to one point as it passes...

I Seem to Have a LinkedIn Account
From Schneier on Security

I Seem to Have a LinkedIn Account

I seem to have a LinkedIn account. This comes as a surprise, since I don't have a LinkedIn account, and have never logged in to LinkedIn. Does anyone have any contacts...

Confusing Self-Driving Cars by Altering Road Signs
From Schneier on Security

Confusing Self-Driving Cars by Altering Road Signs

Researchers found that they could confuse the road sign detection algorithms of self-driving cars by adding stickers to the signs on the road. They could, for example...

Turning an Amazon Echo into an Eavesdropping Device
From Schneier on Security

Turning an Amazon Echo into an Eavesdropping Device

For once, the real story isn't as bad as it seems. A researcher has figured out how to install malware onto an Echo that causes it to stream audio back to a remote...

More on the Vulnerabilities Equities Process
From Schneier on Security

More on the Vulnerabilities Equities Process

Richard Ledgett -- a former Deputy Director of the NSA -- argues against the US government disclosing all vulnerabilities: Proponents argue that this would allow...

Uber Drivers Hacking the System to Cause Surge Pricing
From Schneier on Security

Uber Drivers Hacking the System to Cause Surge Pricing

Interesting story about Uber drivers who have figured out how to game the company's algorithms to cause surge pricing: According to the study. drivers manipulate...

Hacking Slot Machines by Reverse-Engineering the Random Number Generators
From Schneier on Security

Hacking Slot Machines by Reverse-Engineering the Random Number Generators

Interesting story: The venture is built on Alex's talent for reverse engineering the algorithms -- known as pseudorandom number generators, or PRNGs -- that govern...

Friday Squid Blogging: Squid Fake News
From Schneier on Security

Friday Squid Blogging: Squid Fake News

I never imagined that there would be fake news about squid. (That website lets you write your own stories.) As usual, you can also use this squid post to talk about...

Penetrating a Casino's Network through an Internet-Connected Fish Tank
From Schneier on Security

Penetrating a Casino's Network through an Internet-Connected Fish Tank

Attackers used a vulnerability in an Internet-connected fish tank to successfully penetrate a casino's network. BoingBoing post....

Splitting the NSA and US Cyber Command
From Schneier on Security

Splitting the NSA and US Cyber Command

Rumor is that the Trump administration will separate the NSA and US Cyber Command. I have long thought this was a good idea. Here's a good discussion of what it...

Voting Machine Security
From Schneier on Security

Voting Machine Security

Last week, DefCon hosted a "Voter Hacker Village" event. Every single voting machine there was easily hackable. Here are detailed details. There should be a summary...

Detecting Stingrays
From Schneier on Security

Detecting Stingrays

Researchers are developing technologies that can detect IMSI-catchers: those fake cell phone towers that can be used to surveil people in the area. This is good...

NSA Collects MS Windows Error Information
From Schneier on Security

NSA Collects MS Windows Error Information

Back in 2013, Der Spiegel reported that the NSA intercepts and collects Windows bug reports: One example of the sheer creativity with which the TAO spies approach...

Vulnerabilities in Car Washes
From Schneier on Security

Vulnerabilities in Car Washes

Articles about serious vulnerabilities in IoT devices and embedded systems are now dime-a-dozen. This one concerns Internet-connected car washes: A group of security...

Robot Safecracking
From Schneier on Security

Robot Safecracking

Robots can crack safes faster than humans -- and differently: So Seidle started looking for shortcuts. First he found that, like many safes, his SentrySafe had...

Measuring Vulnerability Rediscovery
From Schneier on Security

Measuring Vulnerability Rediscovery

New paper: "Taking Stock: Estimating Vulnerability Rediscovery," by Trey Herr, Bruce Schneier, and Christopher Morris: Abstract: How often do multiple, independent...

Friday Squid Blogging: Giant Squids Have Small Brains
From Schneier on Security

Friday Squid Blogging: Giant Squids Have Small Brains

New research: In this study, the optic lobe of a giant squid (Architeuthis dux, male, mantle length 89 cm), which was caught by local fishermen off the northeastern...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account