acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Friday Squid Blogging: How the Squid Lost Its Shell
From Schneier on Security

Friday Squid Blogging: How the Squid Lost Its Shell

Squids used to have shells. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting...

Airline Ticket Fraud
From Schneier on Security

Airline Ticket Fraud

New research: "Leaving on a jet plane: the trade in fraudulently obtained airline tickets:" Abstract: Every day, hundreds of people fly on airline tickets that...

Supply-Chain Security
From Schneier on Security

Supply-Chain Security

Earlier this month, the Pentagon stopped selling phones made by the Chinese companies ZTE and Huawei on military bases because they might be used to spy on their...

Virginia Beach Police Want Encrypted Radios
From Schneier on Security

Virginia Beach Police Want Encrypted Radios

This article says that the Virginia Beach police are looking to buy encrypted radios. Virginia Beach police believe encryption will prevent criminals from listening...

The US Is Unprepared for Election-Related Hacking in 2018
From Schneier on Security

The US Is Unprepared for Election-Related Hacking in 2018

This survey and report is not surprising: The survey of nearly forty Republican and Democratic campaign operatives, administered through November and December 2017...

Ray Ozzie's Encryption Backdoor
From Schneier on Security

Ray Ozzie's Encryption Backdoor

Last month, Wired published a long article about Ray Ozzie and his supposed new scheme for adding a backdoor in encrypted devices. It's a weird article. It paints...

Friday Squid Blogging: US Army Developing 3D-Printable Battlefield Robot Squid
From Schneier on Security

Friday Squid Blogging: US Army Developing 3D-Printable Battlefield Robot Squid

The next major war will be super weird. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my...

Detecting Laptop Tampering
From Schneier on Security

Detecting Laptop Tampering

Micah Lee ran a two-year experiment designed to detect whether or not his laptop was ever tampered with. The results are inconclusive, but demonstrate how difficult...

LC4: Another Pen-and-Paper Cipher
From Schneier on Security

LC4: Another Pen-and-Paper Cipher

Interesting symmetric cipher: LC4: Abstract: ElsieFour (LC4) is a low-tech cipher that can be computed by hand; but unlike many historical ciphers, LC4 is designed...

NIST Issues Call for "Lightweight Cryptography" Algorithms
From Schneier on Security

NIST Issues Call for "Lightweight Cryptography" Algorithms

This is interesting: Creating these defenses is the goal of NIST's lightweight cryptography initiative, which aims to develop cryptographic algorithm standards...

IoT Inspector Tool from Princeton
From Schneier on Security

IoT Inspector Tool from Princeton

Researchers at Princeton University have released IoT Inspector, a tool that analyzes the security and privacy of IoT devices by examining the data they send across...

Security Vulnerabilities in VingCard Electronic Locks
From Schneier on Security

Security Vulnerabilities in VingCard Electronic Locks

Researchers have disclosed a massive vulnerability in the VingCard eletronic lock system, used in hotel rooms around the world: With a $300 Proxmark RFID card reading...

Friday Squid Blogging: Bizarre Contorted Squid
From Schneier on Security

Friday Squid Blogging: Bizarre Contorted Squid

This bizarre contorted squid might be a new species, or a previously known species exhibiting a new behavior. No one knows. As usual, you can also use this squid...

TSB Bank Disaster
From Schneier on Security

TSB Bank Disaster

This seems like an absolute disaster: The very short version is that a UK bank, TSB, which had been merged into and then many years later was spun out of Lloyds...

New NSA/Cyber Command Head Confirmed by Senate
From Schneier on Security

New NSA/Cyber Command Head Confirmed by Senate

It's Lt. Gen. Paul Nakasone. I know nothing about him....

Two NSA Algorithms Rejected by the ISO
From Schneier on Security

Two NSA Algorithms Rejected by the ISO

The ISO has rejected two symmetric encryption algorithms: SIMON and SPECK. These algorithms were both designed by the NSA and made public in 2013. They are optimized...

Baseball Code
From Schneier on Security

Baseball Code

Info on the coded signals used by the Colorado Rockies....

Computer Alarm that Triggers When Lid Is Opened
From Schneier on Security

Computer Alarm that Triggers When Lid Is Opened

"Do Not Disturb" is a Macintosh app that send an alert when the lid is opened. The idea is to detect computer tampering. Wire article: Do Not Disturb goes a step...

Russia is Banning Telegram
From Schneier on Security

Russia is Banning Telegram

Russia has banned the secure messaging app Telegram. It's making an absolute mess of the ban -- blocking 16 million IP addresses, many belonging to the Amazon and...

Yet Another Biometric: Ear Shape
From Schneier on Security

Yet Another Biometric: Ear Shape

This acoustic technology identifies individuals by their ear shapes. No information about either false positives or false negatives....
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account