Sign In

Communications of the ACM

Blogroll



Friday Squid Blogging: Live Squid Washes up on North Carolina Beach
From Schneier on Security

Friday Squid Blogging: Live Squid Washes up on North Carolina Beach

A "mysterious squid" -- big and red -- washed up on a beach in Carteret County, North Carolina. Someone found it, still alive, and set it back in the water after...

Jumping Airgaps with a Laser and a Scanner
From Schneier on Security

Jumping Airgaps with a Laser and a Scanner

Researchers have configured two computers to talk to each other using a laser and a scanner. Scanners work by detecting reflected light on their glass pane. The...

Reading Analytics and Privacy
From Schneier on Security

Reading Analytics and Privacy

Interesting paper: "The rise of reading analytics and the emerging calculus of reading privacy in the digital world," by Clifford Lynch: Abstract: This paper studies...

Analyzing Cyber Insurance Policies
From Schneier on Security

Analyzing Cyber Insurance Policies

There's a really interesting new paper analyzing over 100 different cyber insurance policies. From the abstract: In this research paper, we seek to answer fundamental...

Advances in Ad Blocking
From Schneier on Security

Advances in Ad Blocking

Ad blockers represent the largest consumer boycott in human history. They're also an arms race between the blockers and the blocker blockers. This article discusses...

Faking Domain Names with Unicode Characters
From Schneier on Security

Faking Domain Names with Unicode Characters

It's things like this that make phishing attacks easier. News article....

Friday Squid Blogging: Video of Squid Attacking Another Squid
From Schneier on Security

Friday Squid Blogging: Video of Squid Attacking Another Squid

Wow, is this cool. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines...

Tracing Spam from E-mail Headers
From Schneier on Security

Tracing Spam from E-mail Headers

Interesting article from Brian Krebs....

The DEA Is Buying Cyberweapons from Hacking Team
From Schneier on Security

The DEA Is Buying Cyberweapons from Hacking Team

The US Drug Enforcement Agency has purchased zero-day exploits from the cyberweapons arms manufacturer Hacking Team. BoingBoing post....

Smart TV Hack via the Broadcast Signal
From Schneier on Security

Smart TV Hack via the Broadcast Signal

This is impressive: The proof-of-concept exploit uses a low-cost transmitter to embed malicious commands into a rogue TV signal. That signal is then broadcast to...

Covert Channel via Two VMs
From Schneier on Security

Covert Channel via Two VMs

Researchers build a covert channel between two virtual machines using a shared cache....

Surveillance and our Insecure Infrastructure
From Schneier on Security

Surveillance and our Insecure Infrastructure

Since Edward Snowden revealed to the world the extent of the NSA's global surveillance network, there has been a vigorous debate in the technological community...

Friday Squid Blogging: Chilean Squid Producer Diversifies
From Schneier on Security

Friday Squid Blogging: Chilean Squid Producer Diversifies

In another symptom of climate change, Chile's largest squid producer "plans to diversify its offering in the future, selling sea urchin, cod and octopus, to compensate...

New C++ Secure Coding Standard
From Schneier on Security

New C++ Secure Coding Standard

Carnegie Mellon University has released a comprehensive list of C++ secure-coding best practices....

2017 Security Protocols Workshop
From Schneier on Security

2017 Security Protocols Workshop

Ross Anderson liveblogged the presentations....

Attack vs. Defense in Nation-State Cyber Operations
From Schneier on Security

Attack vs. Defense in Nation-State Cyber Operations

I regularly say that, on the Internet, attack is easier than defense. There are a bunch of reasons for this, but primarily it's 1) the complexity of modern networked...

Research on Tech-Support Scams
From Schneier on Security

Research on Tech-Support Scams

Interesting paper: "Dial One for Scam: A Large-Scale Analysis of Technical Support Scams": Abstract: In technical support scams, cybercriminals attempt to convince...

New Destructive Malware Bricks IoT Devices
From Schneier on Security

New Destructive Malware Bricks IoT Devices

There's a new malware called BrickerBot that permanently disables vulnerable IoT devices by corrupting their storage capability and reconfiguring kernel parameters...

Fourth WikiLeaks CIA Attack Tool Dump
From Schneier on Security

Fourth WikiLeaks CIA Attack Tool Dump

WikiLeaks is obviously playing their Top Secret CIA data cache for as much press as they can, leaking the documents a little at a time. On Friday they published...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account
Read CACM in a free mobile app!
Access the latest issue, plus archived issues and more
ACM Logo
  • ACM CACM apps available for iPad, iPhone and iPod Touch, and Android platforms
  • ACM Digital Library apps available for iOS, Android, and Windows devices
  • Download an app and sign in to it with your ACM Web Account
Find the app for your mobile device
ACM DL Logo