acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Military Robots as a Nature Analog
From Schneier on Security

Military Robots as a Nature Analog

This very interesting essay looks at the future of military robotics and finds many analogs in nature: Imagine a low-cost drone with the range of a Canada goose...

Massive Government Data Leak in Sweden
From Schneier on Security

Massive Government Data Leak in Sweden

Seems to be incompetence rather than malice, but a good example of the dangers of blindly trusting the cloud....

Your Personal Bodycam
From Schneier on Security

Your Personal Bodycam

Shonin is a personal bodycam up on Kickstarter. There are a lot of complicated issues surrounding bodycams -- for example, it's obvious that police bodycams reduce...

Insider Attack on Lottery Software
From Schneier on Security

Insider Attack on Lottery Software

Eddie Tipton, a programmer for the Multi-State Lottery Association, secretly installed software that allowed him to predict jackpots. What's surprising to me is...

iOS 11 Allows Users to Disable Touch ID
From Schneier on Security

iOS 11 Allows Users to Disable Touch ID

A new feature in Apple's new iPhone operating system -- iOS 11 -- will allow users to quickly disable Touch ID. A new setting, designed to automate emergency services...

Friday Squid Blogging: Brittle Star Catches a Squid
From Schneier on Security

Friday Squid Blogging: Brittle Star Catches a Squid

Watch a brittle star catch a squid, and then lose it to another brittle star. As usual, you can also use this squid post to talk about the security stories in the...

More on My LinkedIn Account
From Schneier on Security

More on My LinkedIn Account

I have successfully gotten the fake LinkedIn account in my name deleted. To prevent someone from doing this again, I signed up for LinkedIn. This is my first --...

Unfixable Automobile Computer Security Vulnerability
From Schneier on Security

Unfixable Automobile Computer Security Vulnerability

There is an unpatchable vulnerability that affects most modern cars. It's buried in the Controller Area Network (CAN): Researchers say this flaw is not a vulnerability...

Do the Police Need a Search Warrant to Access Cell Phone Location Data?
From Schneier on Security

Do the Police Need a Search Warrant to Access Cell Phone Location Data?

The US Supreme Court is deciding a case that will establish whether the police need a warrant to access cell phone location data. This week I signed on to an amicus...

Hacking a Gene Sequencer by Encoding Malware in a DNA Strand
From Schneier on Security

Hacking a Gene Sequencer by Encoding Malware in a DNA Strand

One of the common ways to hack a computer is to mess with its input data. That is, if you can feed the computer data that it interprets -- or misinterprets -- in...

Bank Robbery Tactic
From Schneier on Security

Bank Robbery Tactic

This video purports to be a bank robbery in Kiev. He first threatens a teller, who basically ignores him because she's behind bullet-proof glass. But then the robber...

Friday Squid Blogging: Squid Eyeballs
From Schneier on Security

Friday Squid Blogging: Squid Eyeballs

Details on how a squid's eye corrects for underwater distortion: Spherical lenses, like the squids', usually can't focus the incoming light to one point as it passes...

I Seem to Have a LinkedIn Account
From Schneier on Security

I Seem to Have a LinkedIn Account

I seem to have a LinkedIn account. This comes as a surprise, since I don't have a LinkedIn account, and have never logged in to LinkedIn. Does anyone have any contacts...

Confusing Self-Driving Cars by Altering Road Signs
From Schneier on Security

Confusing Self-Driving Cars by Altering Road Signs

Researchers found that they could confuse the road sign detection algorithms of self-driving cars by adding stickers to the signs on the road. They could, for example...

Turning an Amazon Echo into an Eavesdropping Device
From Schneier on Security

Turning an Amazon Echo into an Eavesdropping Device

For once, the real story isn't as bad as it seems. A researcher has figured out how to install malware onto an Echo that causes it to stream audio back to a remote...

More on the Vulnerabilities Equities Process
From Schneier on Security

More on the Vulnerabilities Equities Process

Richard Ledgett -- a former Deputy Director of the NSA -- argues against the US government disclosing all vulnerabilities: Proponents argue that this would allow...

Uber Drivers Hacking the System to Cause Surge Pricing
From Schneier on Security

Uber Drivers Hacking the System to Cause Surge Pricing

Interesting story about Uber drivers who have figured out how to game the company's algorithms to cause surge pricing: According to the study. drivers manipulate...

Hacking Slot Machines by Reverse-Engineering the Random Number Generators
From Schneier on Security

Hacking Slot Machines by Reverse-Engineering the Random Number Generators

Interesting story: The venture is built on Alex's talent for reverse engineering the algorithms -- known as pseudorandom number generators, or PRNGs -- that govern...

Friday Squid Blogging: Squid Fake News
From Schneier on Security

Friday Squid Blogging: Squid Fake News

I never imagined that there would be fake news about squid. (That website lets you write your own stories.) As usual, you can also use this squid post to talk about...

Penetrating a Casino's Network through an Internet-Connected Fish Tank
From Schneier on Security

Penetrating a Casino's Network through an Internet-Connected Fish Tank

Attackers used a vulnerability in an Internet-connected fish tank to successfully penetrate a casino's network. BoingBoing post....
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account