acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

NSA Given More Ability to Share Raw Intelligence Data
From Schneier on Security

NSA Given More Ability to Share Raw Intelligence Data

President Obama has changed the rules regarding raw intelligence, allowing the NSA to share raw data with the US's other 16 intelligence agencies. The new rules...

Twofish Power Analysis Attack
From Schneier on Security

Twofish Power Analysis Attack

New paper: "A Simple Power Analysis Attack on the Twofish Key Schedule." This shouldn't be a surprise; these attacks are devastating if you don't take steps to...

Law Enforcement Access to IoT Data
From Schneier on Security

Law Enforcement Access to IoT Data

In the first of what will undoubtedly be a large number of battles between companies that make IoT devices and the police, Amazon is refusing to comply with a warrant...

Should Elections Be Classified as "Critical Infrastructure"?
From Schneier on Security

Should Elections Be Classified as "Critical Infrastructure"?

I am co-author on a paper discussing whether elections be classified as "critical infrastructure" in the US, based on experiences in other countries: Abstract:...

FDA Recommendations on Medical-Device Cybersecurity
From Schneier on Security

FDA Recommendations on Medical-Device Cybersecurity

The FDA has issued a report giving medical devices guidance on computer and network security. There's nothing particularly new or interesting; it reads like standard...

Attributing the DNC Hacks to Russia
From Schneier on Security

Attributing the DNC Hacks to Russia

President Barack Obama's public accusation of Russia as the source of the hacks in the US presidential election and the leaking of sensitive e-mails through WikiLeaks...

Friday Squid Blogging: Simple Grilled Squid Recipe
From Schneier on Security

Friday Squid Blogging: Simple Grilled Squid Recipe

Easy recipe from America's Test Kitchen. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

The Effect of Real Names on Online Behavior
From Schneier on Security

The Effect of Real Names on Online Behavior

Good article debunking the myth that requiring people to use their real names on the Internet makes them behave better....

Cryptographic Capabilities of the Barbie Typewriter
From Schneier on Security

Cryptographic Capabilities of the Barbie Typewriter

They're not much, but they do exist....

An SQL Injection Attack Is a Legal Company Name in the UK
From Schneier on Security

An SQL Injection Attack Is a Legal Company Name in the UK

Someone just registered their company name as ; DROP TABLE "COMPANIES";-- LTD. Reddit thread. Obligatory xkcd comic....

Are We Becoming More Moral Faster Than We're Becoming More Dangerous?
From Schneier on Security

Are We Becoming More Moral Faster Than We're Becoming More Dangerous?

In The Better Angels of Our Nature, Steven Pinker convincingly makes the point that by pretty much every measure you can think of, violence has declined on our...

Class Breaks
From Schneier on Security

Class Breaks

There's a concept from computer security known as a class break. It's a particular security vulnerability that breaks not just one system, but an entire class of...

Photocopier Security
From Schneier on Security

Photocopier Security

A modern photocopier is basically a computer with a scanner and printer attached. This computer has a hard drive, and scans of images are regularly stored on that...

Friday Squid Blogging: Will Fish and Chips Become Squid and Chips?
From Schneier on Security

Friday Squid Blogging: Will Fish and Chips Become Squid and Chips?

BBC.com reports that squid are proliferating around the North Sea, and speculates that they will become an increasingly common British dinner. As usual, you can...

Effects of the 2011 DigiNotar Attack
From Schneier on Security

Effects of the 2011 DigiNotar Attack

Nice article on the 2011 DigiNotar attack and how it changed security practices in the CA industry....

How Signal Is Evading Censorship
From Schneier on Security

How Signal Is Evading Censorship

Signal, the encrypted messaging app I prefer, is being blocked in both Egypt and the UAE. Recently, the Signal team developed a workaround: domain fronting. Signal's...

Security Risks of TSA PreCheck
From Schneier on Security

Security Risks of TSA PreCheck

Former TSA Administrator Kip Hawley wrote an op-ed pointing out the security vulnerabilities in the TSA's PreCheck program: The first vulnerability in the system...

Friday Squid Blogging: Squidmas Cards
From Schneier on Security

Friday Squid Blogging: Squidmas Cards

Merry Squidmas. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Russian Military Using Smart Phones to Track Troop Movements
From Schneier on Security

Russian Military Using Smart Phones to Track Troop Movements

Crowdstrike has an interesting blog post about how the Russian military is tracking Ukranian field artillery units by compromising soldiers' smart phones and tracking...

NIST is Continuing to Work on Post-Quantum-Computing Cryptography Standards
From Schneier on Security

NIST is Continuing to Work on Post-Quantum-Computing Cryptography Standards

NIST is accepting proposals for public-key algorithms immune to quantum computing techniques. Details here. Deadline is the end of November 2017. I applaud NIST...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account