acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Automatic Face Recognition and Surveillance
From Schneier on Security

Automatic Face Recognition and Surveillance

ID checks were a common response to the terrorist attacks of 9/11, but they'll soon be obsolete. You won't have to show your ID, because you'll be identified automatically...

Friday Squid Blogging: Bobtail Squid Keeps Bacteria to Protect Its Eggs
From Schneier on Security

Friday Squid Blogging: Bobtail Squid Keeps Bacteria to Protect Its Eggs

The Hawaiian Bobtail Squid deposits bacteria on its eggs to keep them safe. As usual, you can also use this squid post to talk about the security stories in the...

Resilient Systems News
From Schneier on Security

Resilient Systems News

Former Raytheon chief scientist Bill Swanson has joined our board of directors. For those who don't know, Resilient Systems is my company. I'm the CTO, and we sell...

Stealing Fingerprints
From Schneier on Security

Stealing Fingerprints

The news from the Office of Personnel Management hack keeps getting worse. In addition to the personal records of over 20 million US government employees, we've...

Existential Risk and Technological Advancement
From Schneier on Security

Existential Risk and Technological Advancement

AI theorist Eliezer Yudkowsky: "Every eighteen months, the minimum IQ necessary to destroy the world drops by one point." Oh, how I wish I said that....

Identifying CIA Officers in the Field
From Schneier on Security

Identifying CIA Officers in the Field

During the Cold War, the KGB was very adept at identifying undercover CIA officers in foreign countries through what was basically big data analysis. (Yes, this...

Spoofing Fitness Trackers
From Schneier on Security

Spoofing Fitness Trackers

The website Unfitbits.com has a series of instructional videos on how to spoof fitness trackers, using such things as a metronome, pendulum, or power drill. With...

Volkswagen and Cheating Software
From Schneier on Security

Volkswagen and Cheating Software

For the past six years, Volkswagen has been cheating on the emissions testing for its diesel cars. The cars' computers were able to detect when they were being...

How GCHQ Tracks Internet Users
From Schneier on Security

How GCHQ Tracks Internet Users

The Intercept has a new story from the Snowden documents about The UK's GCHQ's surveillance of the Internet: The mass surveillance operation ­ code-named KARMA...

Good Article on the Sony Attack
From Schneier on Security

Good Article on the Sony Attack

Fortune has a three-part article on the Sony attack by North Korea. There's not a lot of tech here; it's mostly about Sony's internal politics regarding the movie...

Friday Squid Blogging: Disney's Minigame Squid Wars
From Schneier on Security

Friday Squid Blogging: Disney's Minigame Squid Wars

It looks like a Nintendo game. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Anti-Alien Security
From Schneier on Security

Anti-Alien Security

You can wrap your house in tinfoil, but when you start shining bright lights to defend yourself against alien attack, you've gone too far. In general, society puts...

People Who Need to Pee Are Better at Lying
From Schneier on Security

People Who Need to Pee Are Better at Lying

No, really. Abstract: The Inhibitory-Spillover-Effect (ISE) on a deception task was investigated. The ISE occurs when performance in one self-control task facilitates...

Living in a Code Yellow World
From Schneier on Security

Living in a Code Yellow World

In the 1980s, handgun expert Jeff Cooper invented something called the Color Code to describe what he called the "combat mind-set." Here is his summary: In White...

Hacking the Game Show "Press Your Luck"
From Schneier on Security

Hacking the Game Show "Press Your Luck"

Fascinating story about a man who figured out how to hack the game show "Press Your Luck" in 1984....

Buying an Online Reputation
From Schneier on Security

Buying an Online Reputation

The story of a reporter who set up a fake business and then bought Facebook fans, Twitter followers, and online reviews. It was surprisingly easy and cheap....

Bringing Frozen Liquids through Airport Security
From Schneier on Security

Bringing Frozen Liquids through Airport Security

Gizmodo reports that UK airport security confiscates frozen liquids: "He told me that it wasn't allowed so I asked under what grounds, given it is not a liquid....

SYNful Knock Attack Against Cisco Routers
From Schneier on Security

SYNful Knock Attack Against Cisco Routers

FireEye is reporting the discovery of persistent malware that compromises Cisco routers: While this attack could be possible on any router technology, in this case...

History of Hacktivism
From Schneier on Security

History of Hacktivism

Nice article by Dorothy Denning. Hacktivism emerged in the late 1980s at a time when hacking for fun and profit were becoming noticeable threats. Initially it took...

Friday Squid Blogging; Giant Squid Sculpture at Burning Man
From Schneier on Security

Friday Squid Blogging; Giant Squid Sculpture at Burning Man

It looks impressive, maybe 20-30 feet long: "I think this might be the coolest thing I have ever built," said Barry Crawford about his giant, metal squid that was...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account