acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Developments in Facial Recognition
From Schneier on Security

Developments in Facial Recognition

Eventually, it will work. You'll be able to wear a camera that will automatically recognize someone walking towards you, and a microphone that will automatically...

Attacking PLCs Controlling Prison Doors
From Schneier on Security

Attacking PLCs Controlling Prison Doors

Embedded system vulnerabilities in prisons: Some of the same vulnerabilities that the Stuxnet superworm used to sabotage centrifuges at a nuclear plant in Iran...

Breaking the Xilinx Virtex-II FPGA Bitstream Encryption
From Schneier on Security

Breaking the Xilinx Virtex-II FPGA Bitstream Encryption

It's a power-analysis attack, which makes it much harder to defend against. And since the attack model is an engineer trying to reverse-engineer the chip, it's...

Using Science Fiction to Teach Computer Security
From Schneier on Security

Using Science Fiction to Teach Computer Security

Interesting paper: "Science Fiction Prototyping and Security Education: Cultivating Contextual and Societal Thinking in Computer Security Education and Beyond,"...

Friday Squid Blogging: 25-foot Giant Squid Caught in Fishing Net
From Schneier on Security

Friday Squid Blogging: 25-foot Giant Squid Caught in Fishing Net

A 25-foot (or maybe 23-foot) giant squid was caught off the coast of Florida. Also, I'm going to try something new. Let's use this weekly squid post to talk...

Luggage Hack
From Schneier on Security

Luggage Hack

Bypassing the lock on luggage.

Hacking Apple Laptop Batteries
From Schneier on Security

Hacking Apple Laptop Batteries

Interesting: Security researcher Charlie Miller, widely known for his work on Mac OS X and Apple's iOS, has discovered an interesting method that enables him to...

ShareMeNot
From Schneier on Security

ShareMeNot

ShareMeNot is a Firefox add-on for preventing tracking from third-party buttons (like the Facebook "Like" button or the Google "+1" button) until the user actually...

Data Privacy as a Prisoner's Dilemma
From Schneier on Security

Data Privacy as a Prisoner's Dilemma

Good analysis: Companies would be better off if they all provided meaningful privacy protections for consumers, but privacy is a collective action problem for...

Cryptography and Wiretapping
From Schneier on Security

Cryptography and Wiretapping

Matt Blaze analyzes the 2010 U.S. Wiretap Report. In 2000, government policy finally reversed course, acknowledging that encryption needed to become a critical...

Ars Technica on Liabilities and Computer Security
From Schneier on Security

Ars Technica on Liabilities and Computer Security

Good article: Halderman argued that secure software tends to come from companies that have a culture of taking security seriously. But it's hard to mandate, or...

Duplicating Physical Keys from Photographs (Sneakey)
From Schneier on Security

Duplicating Physical Keys from Photographs (Sneakey)

In this demonstration, researchers photographed keys from 200 feet away and then made working copies. From the paper: The access control provided by a physical...

iPhone Iris Scanning Technology
From Schneier on Security

iPhone Iris Scanning Technology

No indication about how well it works: The smartphone-based scanner, named Mobile Offender Recognition and Information System, or MORIS, is made by BI2 Technologies...

Revenge Effects of Too-Safe Playground Equipment
From Schneier on Security

Revenge Effects of Too-Safe Playground Equipment

Sometimes too much security isn't good. After observing children on playgrounds in Norway, England and Australia, Dr. Sandseter identified six categories of risky...

Smuggling Drugs in Unwitting People's Car Trunks
From Schneier on Security

Smuggling Drugs in Unwitting People's Car Trunks

This is clever: A few miles away across the Rio Grande, the FBI determined that Chavez and Gomez were using lookouts to monitor the SENTRI Express Lane at the...

Friday Squid Blogging: Glass Squid
From Schneier on Security

Friday Squid Blogging: Glass Squid

Pretty.

Is There a Hacking Epidemic?
From Schneier on Security

Is There a Hacking Epidemic?

Freakonomics asks: "Why has there been such a spike in hacking recently? Or is it merely a function of us paying closer attention and of institutions being more...

Google Detects Malware in its Search Data
From Schneier on Security

Google Detects Malware in its Search Data

This is interesting: As we work to protect our users and their information, we sometimes discover unusual patterns of activity. Recently, we found some unusual...

Members of "Anonymous" Hacker Group Arrested
From Schneier on Security

Members of "Anonymous" Hacker Group Arrested

The police arrested sixteen suspected members of the Anonymous hacker group. Whatever you may think of their politics, the group committed crimes and their members...

Telex Anti-Censorship System
From Schneier on Security

Telex Anti-Censorship System

This is really clever: Many anticensorship systems work by making an encrypted connection (called a “tunnel”) from the user's computer to a trusted proxy server...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account