acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Eavesdropping on Smart Homes with Distributed Wireless Sensors
From Schneier on Security

Eavesdropping on Smart Homes with Distributed Wireless Sensors

"Protecting your daily in-home activity information from a wireless snooping attack," by Vijay Srinivasan, John Stankovic, and Kamin Whitehouse: Abstract: In...

High School Teacher Assigns Movie-Plot Threat Contest Problem
From Schneier on Security

High School Teacher Assigns Movie-Plot Threat Contest Problem

In Australia: A high school teacher who assigned her class to plan a terrorist attack that would kill as many innocent people as possible had no intent to promote...

Misidentification and the Court System
From Schneier on Security

Misidentification and the Court System

Chilling: How do most wrongful convictions come about? The primary cause is mistaken identification. Actually, I wouldn't call it mistaken identification; I'd...

Security Theater on the Boston T
From Schneier on Security

Security Theater on the Boston T

Since a fatal crash a few years ago, Boston T (their subway) operators have been forbidden from using -- or even having -- cell phones while on the job. Passengers...

Friday Squid Blogging: Jewel of the Sea
From Schneier on Security

Friday Squid Blogging: Jewel of the Sea

Pretty.

Me at the EastWest Institute
From Schneier on Security

Me at the EastWest Institute

Back in May, I attended the EastWest Institute's First Worldwide Cybersecurity Summit in Dallas. I only had eight minutes to speak, and tried to turn the dialog...

Is the Whole Country an Airport Security Zone?
From Schneier on Security

Is the Whole Country an Airport Security Zone?

Full-body scanners in roving vans: American Science & Engineering, a company based in Billerica, Massachusetts, has sold U.S. and foreign government agencies more...

Detecting Deception in Conference Calls
From Schneier on Security

Detecting Deception in Conference Calls

Research paper: Detecting Deceptive Discussions in Conference Calls, by David F. Larcker and Anastasia A. Zakolyukina. Abstract: We estimate classification models...

Social Steganography
From Schneier on Security

Social Steganography

From danah boyd: Carmen is engaging in social steganography. She's hiding information in plain sight, creating a message that can be read in one way by those who...

Skeletal Identification
From Schneier on Security

Skeletal Identification

And you thought fingerprints were intrusive. The Wright State Research Institute is developing a ground-breaking system that would scan the skeletal structures...

Malware Contributory Cause of Air Crash
From Schneier on Security

Malware Contributory Cause of Air Crash

This is a first, I think: The airline's central computer which registered technical problems on planes was infected by Trojans at the time of the fatal crash and...

Friday Squid Blogging: Flying Squid
From Schneier on Security

Friday Squid Blogging: Flying Squid

Who knew? "Hulse was shooting with burst mode on his camera, so I know exactly what the interval is between the frames and I can calculate velocity of squid flying...

Intel Buys McAfee
From Schneier on Security

Intel Buys McAfee

Intel McAfee. It's another example of a large non-security company buying a security company. I've been talking about this sort of thing for two and a half years...

"The Fear Tax"
From Schneier on Security

"The Fear Tax"

Good essay by Seth Godin: We pay the fear tax every time we spend time or money seeking reassurance. We pay it twice when the act of seeking that reassurance actually...

Crypto 2010 Proceedings
From Schneier on Security

Crypto 2010 Proceedings

The Crypto 2010 Conference is going on right now at the University of California, Santa Barbara. Springer-Verlag publishes the proceedings, but they're available...

Hacking Cars Through Wireless Tire-Pressure Sensors
From Schneier on Security

Hacking Cars Through Wireless Tire-Pressure Sensors

Still minor, but this kind of thing is only going to get worse: The new research shows that other systems in the vehicle are similarly insecure. The tire pressure...

Breaking into a Garage
From Schneier on Security

Breaking into a Garage

In seconds. Garage doors with automatic openers have always seemed like a lot of security theater to me.

Friday Squid Blogging: Squid Computer Virus
From Schneier on Security

Friday Squid Blogging: Squid Computer Virus

It wasn't me: A hardened computer hacker has been arrested on suspicion of writing a computer virus that systematically destroys all the files on victims' PCs...

Cloning Retail Gift Cards
From Schneier on Security

Cloning Retail Gift Cards

Clever attack. After researching how gift cards work, Zepeda purchased a magnetic card reader online, began stealing blank gift cards, on display for purchase,...

Security Analysis of Smudges on Smart Phone Touch Screens
From Schneier on Security

Security Analysis of Smudges on Smart Phone Touch Screens

"Smudge Attacks on Smartphone Touch Screens": Abstract: Touch screens are an increasingly common feature on personal computing devices, especially smartphones...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account