acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

An Example of Deterrence in Cyberspace
From Schneier on Security

An Example of Deterrence in Cyberspace

In 2016, the US was successfully deterred from attacking Russia in cyberspace because of fears of Russian capabilities against the US. I have two citations for...

The Habituation of Security Warnings
From Schneier on Security

The Habituation of Security Warnings

We all know that it happens: when we see a security warning too often -- and without effect -- we start tuning it out. A new paper uses fMRI, eye tracking, and...

Regulating Bitcoin
From Schneier on Security

Regulating Bitcoin

Ross Anderson has a new paper on cryptocurrency exchanges. From his blog: Bitcoin Redux explains what's going wrong in the world of cryptocurrencies. The bitcoin...

E-Mail Vulnerabilities and Disclosure
From Schneier on Security

E-Mail Vulnerabilities and Disclosure

Last week, researchers disclosed vulnerabilities in a large number of encrypted email clients: specifically, those that use OpenPGP and S/MIME, including Thunderbird...

Friday Squid Blogging: Do Cephalopods Contain Alien DNA?
From Schneier on Security

Friday Squid Blogging: Do Cephalopods Contain Alien DNA?

Maybe not DNA, but biological somethings. "Cause of Cambrian explosion -- Terrestrial or Cosmic?": Abstract: We review the salient evidence consistent with or predicted...

Damaging Hard Drives with an Ultrasonic Attack
From Schneier on Security

Damaging Hard Drives with an Ultrasonic Attack

Playing a sound over the speakers can cause computers to crash and possibly even physically damage the hard drive. Academic paper....

1834: The First Cyberattack
From Schneier on Security

1834: The First Cyberattack

Tom Standage has a great story of the first cyberattack against a telegraph network. The Blanc brothers traded government bonds at the exchange in the city of Bordeaux...

Numbers Stations
From Schneier on Security

Numbers Stations

On numbers stations....

Kidnapping Fraud
From Schneier on Security

Kidnapping Fraud

Fake kidnapping fraud: "Most commonly we have unsolicited calls to potential victims in Australia, purporting to represent the people in authority in China and...

Friday Squid Blogging: Squid Comic
From Schneier on Security

Friday Squid Blogging: Squid Comic

It's not very good, but it has a squid in it. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Security and Human Behavior (SHB 2018)
From Schneier on Security

Security and Human Behavior (SHB 2018)

I'm at Carnegie Mellon University, at the eleventh Workshop on Security and Human Behavior. SHB is a small invitational gathering of people studying various aspects...

Detecting Lies through Mouse Movements
From Schneier on Security

Detecting Lies through Mouse Movements

Interesting research: "The detection of faked identity using unexpected questions and mouse dynamics," by Merulin Monaro, Luciano Gamberini, and Guiseppe Sartori...

Font Steganography
From Schneier on Security

Font Steganography

Interesting research in steganography at the font level....

Supermarket Shoplifting
From Schneier on Security

Supermarket Shoplifting

The rise of self-checkout has caused a corresponding rise in shoplifting....

Another Spectre-Like CPU Vulnerability
From Schneier on Security

Another Spectre-Like CPU Vulnerability

Google and Microsoft researchers have disclosed another Spectre-like CPU side-channel vulnerability, called "Speculative Store Bypass." Like the others, the fix...

Japan's Directorate for Signals Intelligence
From Schneier on Security

Japan's Directorate for Signals Intelligence

The Intercept has a long article on Japan's equivalent of the NSA: the Directorate for Signals Intelligence. Interesting, but nothing really surprising. The directorate...

Friday Squid Blogging: Flying Squid
From Schneier on Security

Friday Squid Blogging: Flying Squid

Flying squid are real. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines...

Maliciously Changing Someone's Address
From Schneier on Security

Maliciously Changing Someone's Address

Someone changed the address of UPS corporate headquarters to his own apartment in Chicago. The company discovered it three months later. The problem, of course,...

White House Eliminates Cybersecurity Position
From Schneier on Security

White House Eliminates Cybersecurity Position

The White House has eliminated the cybersecurity coordinator position. This seems like a spectacularly bad idea....

Accessing Cell Phone Location Information
From Schneier on Security

Accessing Cell Phone Location Information

The New York Times is reporting about a company called Securus Technologies that gives police the ability to track cell phone locations without a warrant: The service...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account