acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Uber Drivers Hacking the System to Cause Surge Pricing
From Schneier on Security

Uber Drivers Hacking the System to Cause Surge Pricing

Interesting story about Uber drivers who have figured out how to game the company's algorithms to cause surge pricing: According to the study. drivers manipulate...

Hacking Slot Machines by Reverse-Engineering the Random Number Generators
From Schneier on Security

Hacking Slot Machines by Reverse-Engineering the Random Number Generators

Interesting story: The venture is built on Alex's talent for reverse engineering the algorithms -- known as pseudorandom number generators, or PRNGs -- that govern...

Friday Squid Blogging: Squid Fake News
From Schneier on Security

Friday Squid Blogging: Squid Fake News

I never imagined that there would be fake news about squid. (That website lets you write your own stories.) As usual, you can also use this squid post to talk about...

Penetrating a Casino's Network through an Internet-Connected Fish Tank
From Schneier on Security

Penetrating a Casino's Network through an Internet-Connected Fish Tank

Attackers used a vulnerability in an Internet-connected fish tank to successfully penetrate a casino's network. BoingBoing post....

Splitting the NSA and US Cyber Command
From Schneier on Security

Splitting the NSA and US Cyber Command

Rumor is that the Trump administration will separate the NSA and US Cyber Command. I have long thought this was a good idea. Here's a good discussion of what it...

Voting Machine Security
From Schneier on Security

Voting Machine Security

Last week, DefCon hosted a "Voter Hacker Village" event. Every single voting machine there was easily hackable. Here are detailed details. There should be a summary...

Detecting Stingrays
From Schneier on Security

Detecting Stingrays

Researchers are developing technologies that can detect IMSI-catchers: those fake cell phone towers that can be used to surveil people in the area. This is good...

NSA Collects MS Windows Error Information
From Schneier on Security

NSA Collects MS Windows Error Information

Back in 2013, Der Spiegel reported that the NSA intercepts and collects Windows bug reports: One example of the sheer creativity with which the TAO spies approach...

Vulnerabilities in Car Washes
From Schneier on Security

Vulnerabilities in Car Washes

Articles about serious vulnerabilities in IoT devices and embedded systems are now dime-a-dozen. This one concerns Internet-connected car washes: A group of security...

Robot Safecracking
From Schneier on Security

Robot Safecracking

Robots can crack safes faster than humans -- and differently: So Seidle started looking for shortcuts. First he found that, like many safes, his SentrySafe had...

Measuring Vulnerability Rediscovery
From Schneier on Security

Measuring Vulnerability Rediscovery

New paper: "Taking Stock: Estimating Vulnerability Rediscovery," by Trey Herr, Bruce Schneier, and Christopher Morris: Abstract: How often do multiple, independent...

Friday Squid Blogging: Giant Squids Have Small Brains
From Schneier on Security

Friday Squid Blogging: Giant Squids Have Small Brains

New research: In this study, the optic lobe of a giant squid (Architeuthis dux, male, mantle length 89 cm), which was caught by local fishermen off the northeastern...

Me on Restaurant Surveillance Technology
From Schneier on Security

Me on Restaurant Surveillance Technology

I attended the National Restaurant Association exposition in Chicago earlier this year, and looked at all the ways modern restaurant IT is spying on people. But...

Zero-Day Vulnerabilities against Windows in the NSA Tools Released by the Shadow Brokers
From Schneier on Security

Zero-Day Vulnerabilities against Windows in the NSA Tools Released by the Shadow Brokers

In April, the Shadow Brokers -- presumably Russia -- released a batch of Windows exploits from what is presumably the NSA. Included in that release were eight different...

Firing a Locked Smart Gun
From Schneier on Security

Firing a Locked Smart Gun

The Armatix IP1 "smart gun" can only be fired by someone who is wearing a special watch. Unfortunately, this security measure is easily hackable....

Roombas will Spy on You
From Schneier on Security

Roombas will Spy on You

The company that sells the Roomba autonomous vacuum wants to sell the data about your home that it collects....

Alternatives to Government-Mandated Encryption Backdoors
From Schneier on Security

Alternatives to Government-Mandated Encryption Backdoors

Policy essay: "Encryption Substitutes," by Andrew Keane Woods: In this short essay, I make a few simple assumptions that bear mentioning at the outset. First, I...

US Army Researching Bot Swarms
From Schneier on Security

US Army Researching Bot Swarms

The US Army Research Agency is funding research into autonomous bot swarms. From the announcement: The objective of this CRA is to perform enabling basic and applied...

Friday Squid Blogging: Giant Squid Caught Off the Coast of Ireland
From Schneier on Security

Friday Squid Blogging: Giant Squid Caught Off the Coast of Ireland

It's the second in two months. Video. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my...

Hacking a Segway
From Schneier on Security

Hacking a Segway

The Segway has a mobile app. It is hackable: While analyzing the communication between the app and the Segway scooter itself, Kilbride noticed that a user PIN number...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account