acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Friday Squid Blogging: Baby Sea Otters Prefer Shrimp to Squid
From Schneier on Security

Friday Squid Blogging: Baby Sea Otters Prefer Shrimp to Squid

At least, this one does. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting...

Tracking People Without GPS
From Schneier on Security

Tracking People Without GPS

Interesting research: The trick in accurately tracking a person with this method is finding out what kind of activity they're performing. Whether they're walking...

Security Planner
From Schneier on Security

Security Planner

Security Planner is a custom security advice tool from Citizen Lab. Answer a few questions, and it gives you a few simple things you can do to improve your security...

E-Mail Tracking
From Schneier on Security

E-Mail Tracking

Good article on the history and practice of e-mail tracking: The tech is pretty simple. Tracking clients embed a line of code in the body of an email­ -- usually...

Remote Hack of a Boeing 757
From Schneier on Security

Remote Hack of a Boeing 757

Last month, the DHS announced that it was able to remotely hack a Boeing 757: "We got the airplane on Sept. 19, 2016. Two days later, I was successful in accomplishing...

Surveillance inside the Body
From Schneier on Security

Surveillance inside the Body

The FDA has approved a pill with an embedded sensor that can report when it is swallowed. The pill transmits information to a wearable patch, which in turn transmits...

Friday Squid Blogging: Squid Embryos Coming to Life
From Schneier on Security

Friday Squid Blogging: Squid Embryos Coming to Life

Beautiful video. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines...

Security Vulnerabilities in Certificate Pinning
From Schneier on Security

Security Vulnerabilities in Certificate Pinning

New research found that many banks offer certificate pinning as a security feature, but fail to authenticate the hostname. This leaves the systems open to man-in...

Germany Preparing Backdoor Law
From Schneier on Security

Germany Preparing Backdoor Law

The German Interior Minister is preparing a bill that allows the government to mandate backdoors in encryption. No details about how likely this is to pass. I am...

Matt Blaze on Securing Voting Machines
From Schneier on Security

Matt Blaze on Securing Voting Machines

Matt Blaze's House testimony on the security of voting machines is an excellent read. (Details on the entire hearing is here.) I have not watched the video....

"Crypto" Is Being Redefined as Cryptocurrencies
From Schneier on Security

"Crypto" Is Being Redefined as Cryptocurrencies

I agree with Lorenzo Franceschi-Bicchierai, "Cryptocurrencies aren't 'crypto'": Lately on the internet, people in the world of Bitcoin and other digital currencies...

Friday Squid Blogging: Research into Squid-Eating Beaked Whales
From Schneier on Security

Friday Squid Blogging: Research into Squid-Eating Beaked Whales

Beaked whales, living off the coasts of Ireland, feed on squid. As usual, you can also use this squid post to talk about the security stories in the news that I...

Needless Panic Over a Wi-FI Network Name
From Schneier on Security

Needless Panic Over a Wi-FI Network Name

A Turkish Airlines flight made an emergency landing because someone named his wireless network (presumably from his smartphone) "bomb on board." In 2006, I wrote...

NSA "Red Disk" Data Leak
From Schneier on Security

NSA "Red Disk" Data Leak

ZDNet is reporting about another data leak, this one from US Army's Intelligence and Security Command (INSCOM), which is also within to the NSA. The disk image,...

Warrant Protections against Police Searches of Our Data
From Schneier on Security

Warrant Protections against Police Searches of Our Data

The cell phones we carry with us constantly are the most perfect surveillance device ever invented, and our laws haven't caught up to that reality. That might change...

Man-in-the-Middle Attack against Electronic Car-Door Openers
From Schneier on Security

Man-in-the-Middle Attack against Electronic Car-Door Openers

This is an interesting tactic, and there's a video of it being used: The theft took just one minute and the Mercedes car, stolen from the Elmdon area of Solihull...

Uber Data Hack
From Schneier on Security

Uber Data Hack

Uber was hacked, losing data on 57 million driver and rider accounts. The company kept it quiet for over a year. The details are particularly damning: The two hackers...

Friday Squid Blogging: Fake Squid Seized in Cambodia
From Schneier on Security

Friday Squid Blogging: Fake Squid Seized in Cambodia

Falsely labeled squid snacks were seized in Cambodia. I don't know what food product it really was. As usual, you can also use this squid post to talk about the...

Mozilla's Guide to Privacy-Aware Christmas Shopping
From Schneier on Security

Mozilla's Guide to Privacy-Aware Christmas Shopping

Mozilla reviews the privacy practices of Internet-connected toys, home accessories, exercise equipment, and more....

Websites Use Session-Replay Scripts to Eavesdrop on Every Keystroke and Mouse Movement
From Schneier on Security

Websites Use Session-Replay Scripts to Eavesdrop on Every Keystroke and Mouse Movement

The security researchers at Princeton are posting You may know that most websites have third-party analytics scripts that record which pages you visit and the searches...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account