acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

An Example of Cell Phone Metadata Forensic Surveillance
From Schneier on Security

An Example of Cell Phone Metadata Forensic Surveillance

In this long article on the 2005 assassination of Rafik Hariri in Beirut, there's a detailed section on what the investigators were able to learn from the cell...

The NSA's Voice-to-Text Capabilities
From Schneier on Security

The NSA's Voice-to-Text Capabilities

New article from the Intercept based on the Snowden documents....

Easily Cracking a Master Combination Lock
From Schneier on Security

Easily Cracking a Master Combination Lock

Impressive. Kamkar told Ars his Master Lock exploit started with a well-known vulnerability that allows Master Lock combinations to be cracked in 100 or fewer tries...

Detecting QUANTUMINSERT
From Schneier on Security

Detecting QUANTUMINSERT

Fox-IT has a blog post (and has published Snort rules) on how to detect man-on-the-side Internet attacks like the NSA's QUANTUMINSERT. From a Wired article: But...

Friday Squid Blogging: Ceramic Squid Planters
From Schneier on Security

Friday Squid Blogging: Ceramic Squid Planters

Nice....

Digital Privacy Public Service Announcement
From Schneier on Security

Digital Privacy Public Service Announcement

I thought this was very well done....

Ears as a Biometric
From Schneier on Security

Ears as a Biometric

It's an obvious biometric for cell phones: Bodyprint recognizes users by their ears with 99.8% precision with a false rejection rate of only 1 out of 13. Grip,...

Measuring the Expertise of Burglars
From Schneier on Security

Measuring the Expertise of Burglars

New research paper: "New methods for examining expertise in burglars in natural and simulated environments: preliminary findings": Expertise literature in mainstream...

Protecting Against Google Phishing in Chrome
From Schneier on Security

Protecting Against Google Phishing in Chrome

Google has a new Chrome extension called "Password Alert": To help keep your account safe, today we're launching Password Alert, a free, open-source Chrome extension...

Remote Proctoring and Surveillance
From Schneier on Security

Remote Proctoring and Surveillance

Interesting article. There are a lot of surveillance and privacy issues at play here....

Shaking Someone Down for His Password
From Schneier on Security

Shaking Someone Down for His Password

A drug dealer claims that the police leaned him over an 18th floor balcony and threatened to kill him if he didn't give up his password. One of the policemen involved...

Nice Essay on Security Snake Oil
From Schneier on Security

Nice Essay on Security Snake Oil

This is good: Just as "data" is being sold as "intelligence", a lot of security technologies are being sold as "security solutions" rather than what they for the...

The History of Lockpicking
From Schneier on Security

The History of Lockpicking

Interesting....

The Further Democratization of Stingray
From Schneier on Security

The Further Democratization of Stingray

Stingray is the code name for an IMSI-catcher, which is basically a fake cell phone tower sold by Harris Corporation to various law enforcement agencies. (It's...

Friday Squid Blogging: The Unique Reproductive Habits of the Vampire Squid
From Schneier on Security

Friday Squid Blogging: The Unique Reproductive Habits of the Vampire Squid

Interesting: While most female squid and octopuses have just one reproductive cycle before they die, vampire squid go through dozens of egg-making cycles in their...

Signed Copies of Data and Goliath
From Schneier on Security

Signed Copies of Data and Goliath

You can now order signed copies of Data and Goliath from my website....

Federal Trade Commissioner Julie Brill on Obscurity
From Schneier on Security

Federal Trade Commissioner Julie Brill on Obscurity

I think this is good: Obscurity means that personal information isn't readily available to just anyone. It doesn't mean that information is wiped out or even locked...

The Further Democratization of QUANTUM
From Schneier on Security

The Further Democratization of QUANTUM

From Data and Goliath: ...when I was working with the Guardian on the Snowden documents, the one top-secret program the NSA desperately did not want us to expose...

An Incredibly Insecure Voting Machine
From Schneier on Security

An Incredibly Insecure Voting Machine

Wow: The weak passwords -- which are hard-coded and can't be changed -- were only one item on a long list of critical defects uncovered by the review. The Wi-Fi...

"Hinky" in Action
From Schneier on Security

"Hinky" in Action

In Beyond Fear I wrote about trained officials recognizing "hinky" and how it differs from profiling: Ressam had to clear customs before boarding the ferry. He...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account