acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

More on Chris Roberts and Avionics Security
From Schneier on Security

More on Chris Roberts and Avionics Security

Last month ago I blogged aboutsecurity researcher Chris Roberts being detained by the FBI after tweeting about avionics security while on a United flight: But to...

United Airlines Offers Frequent Flier Miles for Finding Security Vulnerabilities
From Schneier on Security

United Airlines Offers Frequent Flier Miles for Finding Security Vulnerabilities

Vulnerabilities on the website only, not in airport security or in the avionics....

Friday Squid Blogging: NASA's Squid Rover
From Schneier on Security

Friday Squid Blogging: NASA's Squid Rover

NASA is funding a study for a squid rover that could explore Europa's oceans. As usual, you can also use this squid post to talk about the security stories in the...

Microbe Biometric
From Schneier on Security

Microbe Biometric

Interesting: Franzosa and colleagues used publicly available microbiome data produced through the Human Microbiome Project (HMP), which surveyed microbes in the...

Eighth Movie-Plot Threat Contest Semifinalists
From Schneier on Security

Eighth Movie-Plot Threat Contest Semifinalists

On April 1, I announced the Eighth Movie Plot Threat Contest: demonstrate the evils of encryption. Not a whole lot of good submissions this year. Possibly this...

In Which I Collide with Admiral Rogers
From Schneier on Security

In Which I Collide with Admiral Rogers

Universe does not explode. Photo here....

Admiral Rogers Speaking at the Joint Service Academy Cyber Security Summit
From Schneier on Security

Admiral Rogers Speaking at the Joint Service Academy Cyber Security Summit

Admiral Mike Rogers gave the keynote address at the Joint Service Academy Cyber Security Summit today at West Point. He started by explaining the four tenets of...

License Plate Scanners Hidden in Fake Cactus
From Schneier on Security

License Plate Scanners Hidden in Fake Cactus

The city of Paradise Valley, AZ, is hiding license plate scanners in fake cactus plants....

German Cryptanalysis of the M-209
From Schneier on Security

German Cryptanalysis of the M-209

This 1947 document describes a German machine to cryptanalyze the American M-209 mechanical encryption machine. I can't figure out anything about how it works.....

Amateurs Produce Amateur Cryptography
From Schneier on Security

Amateurs Produce Amateur Cryptography

Anyone can design a cipher that he himself cannot break. This is why you should uniformly distrust amateur cryptography, and why you should only use published algorithms...

More on the NSA's Capabilities
From Schneier on Security

More on the NSA's Capabilities

Ross Anderson summarizes a meeting in Princeton where Edward Snowden was "present." Third, the leaks give us a clear view of an intelligence analyst's workflow....

Friday Squid Blogging: Squid Chair
From Schneier on Security

Friday Squid Blogging: Squid Chair

Squid chair. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Cybersecurity Summer Camps
From Schneier on Security

Cybersecurity Summer Camps

For high-school kids....

Stealing a Billion
From Schneier on Security

Stealing a Billion

It helps if you own the banks: The report said Shor and his associates worked together in 2012 to buy a controlling stake in three Moldovan banks and then gradually...

Online Dating Scams
From Schneier on Security

Online Dating Scams

Interesting research: We identified three types of scams happening on Jiayuan. The first one involves advertising of escort services or illicit goods, and is very...

Another Example of Cell Phone Metadata Forensic Surveillance
From Schneier on Security

Another Example of Cell Phone Metadata Forensic Surveillance

Matthew Cole explains how the Italian police figured out how the CIA kidnapped Abu Omar in Milan. Interesting use of cell phone metadata, showing how valuable it...

An Example of Cell Phone Metadata Forensic Surveillance
From Schneier on Security

An Example of Cell Phone Metadata Forensic Surveillance

In this long article on the 2005 assassination of Rafik Hariri in Beirut, there's a detailed section on what the investigators were able to learn from the cell...

The NSA's Voice-to-Text Capabilities
From Schneier on Security

The NSA's Voice-to-Text Capabilities

New article from the Intercept based on the Snowden documents....

Easily Cracking a Master Combination Lock
From Schneier on Security

Easily Cracking a Master Combination Lock

Impressive. Kamkar told Ars his Master Lock exploit started with a well-known vulnerability that allows Master Lock combinations to be cracked in 100 or fewer tries...

Detecting QUANTUMINSERT
From Schneier on Security

Detecting QUANTUMINSERT

Fox-IT has a blog post (and has published Snort rules) on how to detect man-on-the-side Internet attacks like the NSA's QUANTUMINSERT. From a Wired article: But...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account