acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Punishment and Trust
From Schneier on Security

Punishment and Trust

Interesting research: "Third-party punishment as a costly signal of trustworthiness, by Jillian J. Jordan, Moshe Hoffman, Paul Bloom,and David G. Rand, Nature:...

Analysis of Yemeni Cell Phone Metadata
From Schneier on Security

Analysis of Yemeni Cell Phone Metadata

This research shows the power of cell phone metadata. From an article by the author: Yemen has experienced an array of violent incidents and political turmoil in...

Friday Squid Blogging: Squid Scientists on Tumblr
From Schneier on Security

Friday Squid Blogging: Squid Scientists on Tumblr

Really great Tumblr feed. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Leaked ISIS Documents
From Schneier on Security

Leaked ISIS Documents

Looks like tens of thousands of ISIS documents have been leaked. Where did they come from? We don't know: Documents listing the names of Islamic State fighters...

Espionage Tactics Against Tibetans
From Schneier on Security

Espionage Tactics Against Tibetans

A Citizen Lab research study of Chinese attack and espionage tactics against Tibetan networks and users. This report describes the latest iteration in a long-running...

Hidden Credit Card Skimmers
From Schneier on Security

Hidden Credit Card Skimmers

New credit card skimmers are hidden inside the card readers, making them impossible to spot....

Plagiarism in Crossword Puzzles
From Schneier on Security

Plagiarism in Crossword Puzzles

Yet another fraud discovered through data analysis....

Hacking Ukraine's Power Grid
From Schneier on Security

Hacking Ukraine's Power Grid

This is an excellent article on the December hack of Ukraine's power grid....

Pirates Hack into Shipping Company's Database
From Schneier on Security

Pirates Hack into Shipping Company's Database

A group of pirates -- the real kind -- determined which cargo to steal by hacking into a shipping company's database. Here's the report....

Cheating at Professional Bridge
From Schneier on Security

Cheating at Professional Bridge

Interesting article on detecting cheaters in professional bridge using big-data analysis. Basically, a big part of the game is the communication of information...

Interesting Research on the Economics of Privacy
From Schneier on Security

Interesting Research on the Economics of Privacy

New paper: "The Economics of Privacy, by Alessandro Acquisti, Curtis R. Taylor, and Liad Wagman: Abstract: This article summarizes and draws connections among diverse...

Friday Squid Blogging: Whale Mistaken for Squid
From Schneier on Security

Friday Squid Blogging: Whale Mistaken for Squid

A purported giant squid that washed up on the shore in Norfolk, England, is actually a minke whale. As usual, you can also use this squid post to talk about the...

Sabotaging Bicycle Racks
From Schneier on Security

Sabotaging Bicycle Racks

This is the first time I've heard of this clever hack. Bicycle thieves saw through a bicycle rack and then tape it back together, so unsuspecting people chain their...

Data Is a Toxic Asset
From Schneier on Security

Data Is a Toxic Asset

Thefts of personal information aren't unusual. Every week, thieves break into networks and steal data about people, often tens of millions at a time. Most of the...

DROWN Attack
From Schneier on Security

DROWN Attack

Earlier this week, we learned of yet another attack against SSL/TLS where an attacker can force people to use insecure algorithms. It's called DROWN. Here's a good...

Security Vulnerabilities in Wireless Keyboards
From Schneier on Security

Security Vulnerabilities in Wireless Keyboards

Many wireless keyboards have a security vulnerability that allow someone to hack the computer using the keyboard-computer link. (Technical details here.) An attacker...

The Mathematics of Conspiracy
From Schneier on Security

The Mathematics of Conspiracy

This interesting study tries to build a mathematical model for the continued secrecy of conspiracies, and tries to predict how long before they will be revealed...

Company Tracks Iowa Caucusgoers by their Cell Phones
From Schneier on Security

Company Tracks Iowa Caucusgoers by their Cell Phones

It's not just governments. Companies like Dstillery are doing this too: "We watched each of the caucus locations for each party and we collected mobile device ID's...

WikiLeaks Publishes NSA Target List
From Schneier on Security

WikiLeaks Publishes NSA Target List

As part of an ongoing series of classified NSA target list and raw intercepts, WikiLeaks published details of the NSA's spying on UN Secretary General Ban Ki-Moon...

Lots More Writing about the FBI vs. Apple
From Schneier on Security

Lots More Writing about the FBI vs. Apple

I have written two posts on the case, and at the bottom of those essays are lots of links to other essays written by other people. Here are more links. If you read...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account