acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Using Wi-Fi Signals to Identify People by Body Shape
From Schneier on Security

Using Wi-Fi Signals to Identify People by Body Shape

Another paper on using Wi-Fi for surveillance. This one is on identifying people by their body shape. "FreeSense:Indoor Human Identification with WiFi Signals":...

Keystroke Recognition from Wi-Fi Distortion
From Schneier on Security

Keystroke Recognition from Wi-Fi Distortion

This is interesting research: "Keystroke Recognition Using WiFi Signals." Basically, the user's hand positions as they type distorts the Wi-Fi signal in predictable...

iPhone Zero-Day Used by UAE Government
From Schneier on Security

iPhone Zero-Day Used by UAE Government

Last week, Apple issued a critical security patch for the iPhone: iOS 9.3.5. The incredible story is that this patch is the result of investigative work by Citizen...

Apple Patents Collecting Biometric Information Based on Unauthorized Device Use
From Schneier on Security

Apple Patents Collecting Biometric Information Based on Unauthorized Device Use

Apple received a patent earlier this year on collecting biometric information of an unauthorized device user. The obvious application is taking a copy of the fingerprint...

Friday Squid Blogging: Self-Repairing Fabrics Based on Squid Teeth
From Schneier on Security

Friday Squid Blogging: Self-Repairing Fabrics Based on Squid Teeth

Really: As shown in the video below, researchers at Pennsylvania State University recently developed a polyelectrolyte liquid solution made of bacteria and yeast...

Collision Attacks Against 64-Bit Block Ciphers
From Schneier on Security

Collision Attacks Against 64-Bit Block Ciphers

We've long known that 64 bits is too small for a block cipher these days. That's why new block ciphers like AES have 128-bit, or larger, block sizes. The insecurity...

The NSA is Hoarding Vulnerabilities
From Schneier on Security

The NSA is Hoarding Vulnerabilities

The National Security Agency is lying to us. We know that because of data stolen from an NSA server was dumped on the internet. The agency is hoarding information...

Confusing Security Risks with Moral Judgments
From Schneier on Security

Confusing Security Risks with Moral Judgments

Interesting research that shows we exaggerate the risks of something when we find it morally objectionable. From an article about and interview with the researchers...

Interesting Internet-Based Investigative Techniques
From Schneier on Security

Interesting Internet-Based Investigative Techniques

In this article, detailing the Australian and then worldwide investigation of a particularly heinous child-abuse ring, there are a lot of details of the pedophile...

Privacy Implications of Windows 10
From Schneier on Security

Privacy Implications of Windows 10

The EFF has a good analysis of all the ways Windows 10 violates your privacy....

Research on the Timing of Security Warnings
From Schneier on Security

Research on the Timing of Security Warnings

fMRI experiments show that we are more likely to ignore security warnings when they interrupt other tasks. A new study from BYU, in collaboration with Google Chrome...

Terrorist False Alarm at JFK Airport Demonstrates How Unprepared We Really Are
From Schneier on Security

Terrorist False Alarm at JFK Airport Demonstrates How Unprepared We Really Are

The detailed accounts of the terrorist-shooter false-alarm at Kennedy Airport in New York last week illustrate how completely and totally unprepared the airport...

Windows 10 Update Breaks Most Webcams
From Schneier on Security

Windows 10 Update Breaks Most Webcams

Now's your chance.......

Friday Squid Blogging: Stubby Squid
From Schneier on Security

Friday Squid Blogging: Stubby Squid

Photo of the cutest squid ever. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Unintentional DOS Attack against Car-Door Openers
From Schneier on Security

Unintentional DOS Attack against Car-Door Openers

Radio noise from a nearby neon-sign transformer made it impossible for people to unlock their cars remotely....

More on Election Security
From Schneier on Security

More on Election Security

Andrew Appel has a good two-part essay on securing elections. And three organizations -- Verified Voting, EPIC, and Common Cause -- have published a report on the...

Prisoner's Dilemma Experiment Illustrates Four Basic Phenotypes
From Schneier on Security

Prisoner's Dilemma Experiment Illustrates Four Basic Phenotypes

If you've read my book Liars and Outliers, you know I like the prisoner's dilemma as a way to think about trust and security. There is an enormous amount of research...

Major NSA/Equation Group Leak
From Schneier on Security

Major NSA/Equation Group Leak

The NSA was badly hacked in 2013, and we're just now learning about it. A group of hackers called "The Shadow Brokers" claim to have hacked the NSA, and are posting...

Powerful Bit-Flipping Attack
From Schneier on Security

Powerful Bit-Flipping Attack

New research: "Flip Feng Shui: Hammering a Needle in the Software Stack," by Kaveh Razavi, Ben Gras, Erik Bosman Bart Preneel, Cristiano Giuffrida, and Herbert...

Yet Another Government-Sponsored Malware
From Schneier on Security

Yet Another Government-Sponsored Malware

Both Kaspersky and Symantec have uncovered another piece of malware that seems to be a government design: The malware -- known alternatively as "ProjectSauron"...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account