acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

This Common Home Appliance Can Compromise Your Entire Security
From Schneier on Security

This Common Home Appliance Can Compromise Your Entire Security

LIFX is a smart light bulb that can be controlled with your smart phone via your home's Wi-Fi network. Turns out that anyone within range can obtain the Wi-Fi password...

NSA Spied on Prominent Muslim Americans
From Schneier on Security

NSA Spied on Prominent Muslim Americans

The latest story from the Snowden documents is about five prominent Muslim Americans who were spied on by the NSA and FBI. It's a good story, and I recommend reading...

Here's How Brazilian Crooks Steal Billions
From Schneier on Security

Here's How Brazilian Crooks Steal Billions

Man-in-the-middle attack against a Brazilian payment system: Brazil has an extremely active and talented cybercrime underground, and increasingly Brazilian organized...

These Pickpocket Secrets Will Make You Cry
From Schneier on Security

These Pickpocket Secrets Will Make You Cry

Pickpocket tricks explained by neuroscience. So while sleight of hand helps, it's as much about capturing all of somebody's attention with other movements. Street...

The Simple Trick that Will Keep You Secure from Government Spies
From Schneier on Security

The Simple Trick that Will Keep You Secure from Government Spies

Last week, the German government arrested someone and charged him with spying for the US. Buried in one of the stories was a little bit of tradecraft. The US game...

NSA Employee Flees to Hong Kong -- You Won't Believe What Happens Next
From Schneier on Security

NSA Employee Flees to Hong Kong -- You Won't Believe What Happens Next

The latest story from the Snowden documents analyzes a large cache of intercepted conversations -- actual operational data -- and concludes that 90% of the individuals...

Friday Squid Blogging: Squid T-Shirt
From Schneier on Security

Friday Squid Blogging: Squid T-Shirt

Cute design. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Web Activity Used in Court to Portray State of Mind
From Schneier on Security

Web Activity Used in Court to Portray State of Mind

I don't care about the case, but look at this: "Among the details police have released is that Harris and his wife, Leanna, told them they conducted Internet searches...

NSA Targets Privacy Conscious for Surveillance
From Schneier on Security

NSA Targets Privacy Conscious for Surveillance

Jake Appelbaum et. al, are reporting on XKEYSCORE selection rules that target users -- and people who just visit the websites of -- Tor, Tails, and other sites....

Goldman Sachs Demanding E-Mail be Deleted
From Schneier on Security

Goldman Sachs Demanding E-Mail be Deleted

Goldman Sachs is going to court to demand that Google retroactively delete an e-mail it accidentally sent. The breach occurred on June 23 and included "highly confidential...

Match Fixing in Soccer
From Schneier on Security

Match Fixing in Soccer

Useful primer....

How Traffic Shaping Can Help the NSA Evade Legal Oversight
From Schneier on Security

How Traffic Shaping Can Help the NSA Evade Legal Oversight

New research paper on how the NSA can evade legal prohibitions against collecting Internet data and metadata on Americans by forcing domestic traffic to leave and...

Blackphone
From Schneier on Security

Blackphone

First review of the secure Blackphone....

Friday Squid Blogging: WTF Evolution Features a Squid
From Schneier on Security

Friday Squid Blogging: WTF Evolution Features a Squid

I have always liked the "WTF, Evolution?" blog. Consistently funny, but no squid. But now they have a bit on the vampire squid. As usual, you can also use this...

More on Hacking Team's Government Spying Software
From Schneier on Security

More on Hacking Team's Government Spying Software

Hacking Team is an Italian malware company that sells exploit tools to governments. Both Kaspersky Lab and Citizen Lab have published detailed reports on its capabilities...

Pepper Spray Drones
From Schneier on Security

Pepper Spray Drones

Coming soon to a protest near you: drones that fire pepper spray bullets. Desert Wolf's website states that its Skunk octacopter drone is fitted with four high-capacity...

Risks of Not Understanding a One-Way Function
From Schneier on Security

Risks of Not Understanding a One-Way Function

New York City officials anonymized license plate data by hashing the individual plate numbers with MD5. (I know, they shouldn't have used MD5, but ignore that for...

Could Keith Alexander's Advice Possibly Be Worth $600K a Month?
From Schneier on Security

Could Keith Alexander's Advice Possibly Be Worth $600K a Month?

Ex-NSA director Keith Alexander has his own consulting company: IronNet Cybersecurity Inc. His advice does not come cheap: Alexander offered to provide advice to...

Quadrennial Homeland Security Review
From Schneier on Security

Quadrennial Homeland Security Review

The second Quadrennial Homeland Security Review has been published by the Department of Homeland Security. At 100+ pages, I'm not going to be reading it, but I...

Defending Against Algorithm Substitution Attacks
From Schneier on Security

Defending Against Algorithm Substitution Attacks

Interesting paper: M. Bellare, K. Paterson, and P. Rogaway, "Security of Symmetric Encryption against Mass Surveillance." Abstract: Motivated by revelations concerning...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account