acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Fighting Leakers at Apple
From Schneier on Security

Fighting Leakers at Apple

Apple is fighting its own battle against leakers, using people and tactics from the NSA. According to the hour-long presentation, Apple's Global Security team employs...

Separating the Paranoid from the Hacked
From Schneier on Security

Separating the Paranoid from the Hacked

Sad story of someone whose computer became owned by a griefer: The trouble began last year when he noticed strange things happening: files went missing from his...

The FAA Is Arguing for Security by Obscurity
From Schneier on Security

The FAA Is Arguing for Security by Obscurity

In a proposed rule by the FAA, it argues that software in an Embraer S.A. Model ERJ 190-300 airplane is secure because it's proprietary: In addition, the operating...

Friday Squid Blogging: Injured Giant Squid Video
From Schneier on Security

Friday Squid Blogging: Injured Giant Squid Video

A paddleboarder had a run-in with an injured giant squid. Video. Here's the real story. As usual, you can also use this squid post to talk about the security stories...

The Secret Code of Beatrix Potter
From Schneier on Security

The Secret Code of Beatrix Potter

Interesting: As codes go, Potter's wasn't inordinately complicated. As Wiltshire explains, it was a "mono-alphabetic substitution cipher code," in which each letter...

Amazon Patents Measures to Prevent In-Store Comparison Shopping
From Schneier on Security

Amazon Patents Measures to Prevent In-Store Comparison Shopping

Amazon has been issued a patent on security measures that prevents people from comparison shopping while in the store. It's not a particularly sophisticated patent...

NSA Insider Security Post-Snowden
From Schneier on Security

NSA Insider Security Post-Snowden

According to a recently declassified report obtained under FOIA, the NSA's attempts to protect itself against insider attacks aren't going very well: The N.S.A....

Is Continuing to Patch Windows XP a Mistake?
From Schneier on Security

Is Continuing to Patch Windows XP a Mistake?

Last week, Microsoft issued a security patch for Windows XP, a 16-year-old operating system that Microsoft officially no longer supports. Last month, Microsoft...

The Dangers of Secret Law
From Schneier on Security

The Dangers of Secret Law

Last week, the Department of Justice released 18 new FISC opinions related to Section 702 as part of an EFF FOIA lawsuit. (Of course, they don't mention EFF or...

Ceramic Knife Used in Israel Stabbing
From Schneier on Security

Ceramic Knife Used in Israel Stabbing

I have no comment on the politics of this stabbing attack, and only note that the attacker used a ceramic knife -- that will go through metal detectors. I have...

New Technique to Hijack Social Media Accounts
From Schneier on Security

New Technique to Hijack Social Media Accounts

Access Now has documented it being used against a Twitter user, but it also works against other social media accounts: With the Doubleswitch attack, a hijacker...

Friday Squid Blogging: Squids from Space Video Game
From Schneier on Security

Friday Squid Blogging: Squids from Space Video Game

An early preview. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines...

NSA Links WannaCry to North Korea
From Schneier on Security

NSA Links WannaCry to North Korea

There's evidence: Though the assessment is not conclusive, the preponderance of the evidence points to Pyongyang. It includes the range of computer Internet protocol...

Gaming Google News
From Schneier on Security

Gaming Google News

Turns out that it's surprisingly easy to game: It appears that news sites deemed legitimate by Google News are being modified by third parties. These sites are...

Millennials and Secret Leaking
From Schneier on Security

Millennials and Secret Leaking

I hesitate to blog this, because it's an example of everything that's wrong with pop psychology. Malcolm Harris writes about millennials, and has a theory of why...

Data vs. Analysis in Counterterrorism
From Schneier on Security

Data vs. Analysis in Counterterrorism

This article argues that Britain's counterterrorism problem isn't lack of data, it's lack of analysis....

The grugq on Reality Winner, the Intercept, and OPSEC
From Schneier on Security

The grugq on Reality Winner, the Intercept, and OPSEC

Good commentary....

Security Flaws in 4G VoLTE
From Schneier on Security

Security Flaws in 4G VoLTE

Research paper: "Subscribers remote geolocation and tracking using 4G VoLTE enabled Android phone," by Patrick Ventuzelo, Olivier Le Moal, and Thomas Coudray. Abstract...

Chelsea Manning Profiled in New York Times Magazine
From Schneier on Security

Chelsea Manning Profiled in New York Times Magazine

Interesting reading....

Healthcare Industry Cybersecurity Report
From Schneier on Security

Healthcare Industry Cybersecurity Report

New US government report: "Report on Improving Cybersecurity in the Health Care Industry." It's pretty scathing, but nothing in it will surprise regular readers...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account