acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Me on Restaurant Surveillance Technology
From Schneier on Security

Me on Restaurant Surveillance Technology

I attended the National Restaurant Association exposition in Chicago earlier this year, and looked at all the ways modern restaurant IT is spying on people. But...

Zero-Day Vulnerabilities against Windows in the NSA Tools Released by the Shadow Brokers
From Schneier on Security

Zero-Day Vulnerabilities against Windows in the NSA Tools Released by the Shadow Brokers

In April, the Shadow Brokers -- presumably Russia -- released a batch of Windows exploits from what is presumably the NSA. Included in that release were eight different...

Firing a Locked Smart Gun
From Schneier on Security

Firing a Locked Smart Gun

The Armatix IP1 "smart gun" can only be fired by someone who is wearing a special watch. Unfortunately, this security measure is easily hackable....

Roombas will Spy on You
From Schneier on Security

Roombas will Spy on You

The company that sells the Roomba autonomous vacuum wants to sell the data about your home that it collects....

Alternatives to Government-Mandated Encryption Backdoors
From Schneier on Security

Alternatives to Government-Mandated Encryption Backdoors

Policy essay: "Encryption Substitutes," by Andrew Keane Woods: In this short essay, I make a few simple assumptions that bear mentioning at the outset. First, I...

US Army Researching Bot Swarms
From Schneier on Security

US Army Researching Bot Swarms

The US Army Research Agency is funding research into autonomous bot swarms. From the announcement: The objective of this CRA is to perform enabling basic and applied...

Friday Squid Blogging: Giant Squid Caught Off the Coast of Ireland
From Schneier on Security

Friday Squid Blogging: Giant Squid Caught Off the Coast of Ireland

It's the second in two months. Video. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my...

Hacking a Segway
From Schneier on Security

Hacking a Segway

The Segway has a mobile app. It is hackable: While analyzing the communication between the app and the Segway scooter itself, Kilbride noticed that a user PIN number...

Ethereum Hacks
From Schneier on Security

Ethereum Hacks

The press is reporting a $32M theft of the cryptocurrency Ethereum. Like all such thefts, they're not a result of a cryptographic failure in the currencies, but...

Password Masking
From Schneier on Security

Password Masking

Slashdot asks if password masking -- replacing password characters with asterisks as you type them -- is on the way out. I don't know if that's true, but I would...

Many of My E-Books for Cheap
From Schneier on Security

Many of My E-Books for Cheap

Humble Bundle is selling a bunch of cybersecurity books very cheaply. You can get copies of Applied Cryptography, Secrets and Lies, and Cryptography Engineering...

Australia Considering New Law Weakening Encryption
From Schneier on Security

Australia Considering New Law Weakening Encryption

News from Australia: Under the law, internet companies would have the same obligations telephone companies do to help law enforcement agencies, Prime Minister Malcolm...

Friday Squid Blogging: Eyeball Collector Wants a Giant-Squid Eyeball
From Schneier on Security

Friday Squid Blogging: Eyeball Collector Wants a Giant-Squid Eyeball

They're rare: The one Dubielzig really wants is an eye from a giant squid, which has the biggest eye of any living animal -- it's the size of a dinner plate. "But...

Book Review: Twitter and Tear Gas, by Zeynep Tufekci
From Schneier on Security

Book Review: Twitter and Tear Gas, by Zeynep Tufekci

There are two opposing models of how the Internet has changed protest movements. The first is that the Internet has made protesters mightier than ever. This comes...

Forged Documents and Microsoft Fonts
From Schneier on Security

Forged Documents and Microsoft Fonts

A set of documents in Pakistan were detected as forgeries because their fonts were not in circulation at the time the documents were dated....

Tomato-Plant Security
From Schneier on Security

Tomato-Plant Security

I have a soft spot for interesting biological security measures, especially by plants. I've used them as examples in several of my books. Here's a new one: when...

More on the NSA's Use of Traffic Shaping
From Schneier on Security

More on the NSA's Use of Traffic Shaping

"Traffic shaping" -- the practice of tricking data to flow through a particular route on the Internet so it can be more easily surveiled -- is an NSA technique...

Hacking Spotify
From Schneier on Security

Hacking Spotify

Some of the ways artists are hacking the music-streaming service Spotify....

The Future of Forgeries
From Schneier on Security

The Future of Forgeries

This article argues that AI technologies will make image, audio, and video forgeries much easier in the future. Combined, the trajectory of cheap, high-quality...

Friday Squid Blogging: Why It's Hard to Track the Squid Population
From Schneier on Security

Friday Squid Blogging: Why It's Hard to Track the Squid Population

Counting squid is not easy. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account