acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

How the US Secret Service Breaks into Smart Phones
From Schneier on Security

How the US Secret Service Breaks into Smart Phones

Here's an article about the US Secret Service and their Cell Phone Forensics Facility in Tulsa. I said it before and I'll say it again: the FBI needs technical...

Pacemaker Data Used in Arson Conviction
From Schneier on Security

Pacemaker Data Used in Arson Conviction

Here's a story about data from a pacemaker being used as evidence in an arson conviction....

Security and the Internet of Things
From Schneier on Security

Security and the Internet of Things

Last year, on October 21, your digital video recorder ­- or at least a DVR like yours ­- knocked Twitter off the internet. Someone used your DVR, along with millions...

IoT Ransomware Against Austrian Hotel
From Schneier on Security

IoT Ransomware Against Austrian Hotel

Attackers held an Austrian hotel network for ransom, demanding $1800 in Bitcoin to unlock the network. Among other things, the locked network wouldn't allow any...

New Rules on Data Privacy for Non-US Citizens
From Schneier on Security

New Rules on Data Privacy for Non-US Citizens

Last week, President Trump signed an executive order affecting the privacy rights of non-US citizens with respect to data residing in the US. Here's the relevant...

Friday Squid Blogging: Squid Fossils from the Early Jurassic
From Schneier on Security

Friday Squid Blogging: Squid Fossils from the Early Jurassic

New fossil bed discovered in Alberta: The finds at the site include 16 vampyropods, a relative of the vampire squid with its ink sac and fine details of its muscles...

Research into Twitter Bots
From Schneier on Security

Research into Twitter Bots

There are a lot of them. In a world where the number of fans, friends, followers, and likers are social currency -- and where the number of reposts is a measure...

Duress Codes for Fingerprint Access Control
From Schneier on Security

Duress Codes for Fingerprint Access Control

Mike Specter has an interesting idea on how to make biometric access-control systems more secure: add a duress code. For example, you might configure your iPhone...

Security Risks of the President's Android Phone
From Schneier on Security

Security Risks of the President's Android Phone

Reports are that President Trump is still using his old Android phone. There are security risks here, but they are not the obvious ones. I'm not concerned about...

Capturing Pattern-Lock Authentication
From Schneier on Security

Capturing Pattern-Lock Authentication

Interesting research -- "Cracking Android Pattern Lock in Five Attempts": Abstract: Pattern lock is widely used as a mechanism for authentication and authorization...

How the Media Influences Our Fear of Terrorism
From Schneier on Security

How the Media Influences Our Fear of Terrorism

Good article that crunches the data and shows that the press's coverage of terrorism is disproportional to its comparative risk. This isn't new. I've written about...

Obama's Legacy in Internet Security
From Schneier on Security

Obama's Legacy in Internet Security

NextGov has a nice article summarizing President Obama's accomplishments in Internet security: what he did, what he didn't do, and how it turned out....

Friday Squid Blogging: Know Your Cephalopods
From Schneier on Security

Friday Squid Blogging: Know Your Cephalopods

This graphic shows the important difference between arms and tentacles. As usual, you can also use this squid post to talk about the security stories in the news...

New White House Privacy Report
From Schneier on Security

New White House Privacy Report

Two days ago, the White House released a report on privacy: "Privacy in our Digital Lives: Protecting Individuals and Promoting Innovation." The report summarizes...

Heartbeat as Biometric Password
From Schneier on Security

Heartbeat as Biometric Password

There's research in using a heartbeat as a biometric password. No details in the article. My guess is that there isn't nearly enough entropy in the reproducible...

Brian Krebs Uncovers Murai Botnet Author
From Schneier on Security

Brian Krebs Uncovers Murai Botnet Author

Really interesting investigative story....

WhatsApp Security Vulnerability
From Schneier on Security

WhatsApp Security Vulnerability

Back in March, Rolf Weber wrote about a potential vulnerability in the WhatsApp protocol that would allow Facebook to defeat perfect forward secrecy by forcibly...

Cloudflare's Experience with a National Security Letter
From Schneier on Security

Cloudflare's Experience with a National Security Letter

Interesting post on Cloudflare's experience with receiving a National Security Letter. News article....

Friday Squid Blogging: 1874 Giant Squid Attack
From Schneier on Security

Friday Squid Blogging: 1874 Giant Squid Attack

This article discusses a giant squid attack on a schooner off the coast of Sri Lanka in 1874. As usual, you can also use this squid post to talk about the security...

A Comment on the Trump Dossier
From Schneier on Security

A Comment on the Trump Dossier

Imagine that you are someone in the CIA, concerned about the future of America. You have this Russian dossier on Donald Trump, which you have some evidence might...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account