acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Friday Squid Blogging: Eyeball Collector Wants a Giant-Squid Eyeball
From Schneier on Security

Friday Squid Blogging: Eyeball Collector Wants a Giant-Squid Eyeball

They're rare: The one Dubielzig really wants is an eye from a giant squid, which has the biggest eye of any living animal -- it's the size of a dinner plate. "But...

Book Review: Twitter and Tear Gas, by Zeynep Tufekci
From Schneier on Security

Book Review: Twitter and Tear Gas, by Zeynep Tufekci

There are two opposing models of how the Internet has changed protest movements. The first is that the Internet has made protesters mightier than ever. This comes...

Forged Documents and Microsoft Fonts
From Schneier on Security

Forged Documents and Microsoft Fonts

A set of documents in Pakistan were detected as forgeries because their fonts were not in circulation at the time the documents were dated....

Tomato-Plant Security
From Schneier on Security

Tomato-Plant Security

I have a soft spot for interesting biological security measures, especially by plants. I've used them as examples in several of my books. Here's a new one: when...

More on the NSA's Use of Traffic Shaping
From Schneier on Security

More on the NSA's Use of Traffic Shaping

"Traffic shaping" -- the practice of tricking data to flow through a particular route on the Internet so it can be more easily surveiled -- is an NSA technique...

Hacking Spotify
From Schneier on Security

Hacking Spotify

Some of the ways artists are hacking the music-streaming service Spotify....

The Future of Forgeries
From Schneier on Security

The Future of Forgeries

This article argues that AI technologies will make image, audio, and video forgeries much easier in the future. Combined, the trajectory of cheap, high-quality...

Friday Squid Blogging: Why It's Hard to Track the Squid Population
From Schneier on Security

Friday Squid Blogging: Why It's Hard to Track the Squid Population

Counting squid is not easy. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting...

An Assassin's Teapot
From Schneier on Security

An Assassin's Teapot

This teapot has two chambers. Liquid is released from one or the other depending on whether an air hole is covered. I want one....

DNI Wants Research into Secure Multiparty Computation
From Schneier on Security

DNI Wants Research into Secure Multiparty Computation

The Intelligence Advanced Research Projects Activity (IARPA) is soliciting proposals for research projects in secure multiparty computation: Specifically of interest...

Now It's Easier than Ever to Steal Someone's Keys
From Schneier on Security

Now It's Easier than Ever to Steal Someone's Keys

The website key.me will make a duplicate key from a digital photo. If a friend or coworker leaves their keys unattended for a few seconds, you know what to do.....

Dubai Deploying Autonomous Robotic Police Cars
From Schneier on Security

Dubai Deploying Autonomous Robotic Police Cars

It's hard to tell how much of this story is real and how much is aspirational, but it really is only a matter of time: About the size of a child's electric toy...

Commentary on US Election Security
From Schneier on Security

Commentary on US Election Security

Good commentaries from Ed Felten and Matt Blaze. Both make a point that I have also been saying: hacks can undermine the legitimacy of an election, even if there...

GoldenEye Malware
From Schneier on Security

GoldenEye Malware

I don't have anything to say -- mostly because I'm otherwise busy -- about the malware known as GoldenEye, NotPetya, or ExPetr. But I wanted a post to park links...

A Man-in-the-Middle Attack against a Password Reset System
From Schneier on Security

A Man-in-the-Middle Attack against a Password Reset System

This is nice work: "The Password Reset MitM Attack," by Nethanel Gelerntor, Senia Kalma, Bar Magnezi, and Hen Porcilan: Abstract: We present the password reset...

Food Supplier Passes Squid Off as Octopus
From Schneier on Security

Food Supplier Passes Squid Off as Octopus

According to a lawsuit (main article behind paywall), "a Miami-based food vendor and its supplier have been misrepresenting their squid as octopus in an effort...

Details from the 2017 Workshop on Economics and Information Security
From Schneier on Security

Details from the 2017 Workshop on Economics and Information Security

The 16th Workshop on Economics and Information Security was this week. Ross Anderson liveblogged the talks....

Good Article About Google's Project Zero
From Schneier on Security

Good Article About Google's Project Zero

Fortune magazine just published a good article about Google's Project Zero, which finds and publishes exploits in other companies' software products. I have mixed...

The Women of Bletchley Park
From Schneier on Security

The Women of Bletchley Park

Really good article about the women who worked at Bletchley Park during World War II, breaking German Enigma-encrypted messages....

Websites Grabbing User-Form Data Before It's Submitted
From Schneier on Security

Websites Grabbing User-Form Data Before It's Submitted

Websites are sending information prematurely: ...we discovered NaviStone's code on sites run by Acurian, Quicken Loans, a continuing education center, a clothing...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account