acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Hacking Gesture-Based Security
From Schneier on Security

Hacking Gesture-Based Security

Interesting research: Abdul Serwadda, Vir V. Phoha, Zibo Wang, Rajesh Kumar, and Diksha Shukla, "Robotic Robbery on the Touch Screen," ACM Transactions on Information...

FTC Investigating Android Patching Practices
From Schneier on Security

FTC Investigating Android Patching Practices

It's a known truth that most Android vulnerabilities don't get patched. It's not Google's fault. They release the patches, but the phone carriers don't push them...

New Credit Card Scam
From Schneier on Security

New Credit Card Scam

A criminal ring was arrested in Malaysia for credit card fraud: They would visit the online shopping websites and purchase all their items using phony credit card...

Children of Spies
From Schneier on Security

Children of Spies

Fascinating story of Tim and Alex Foley, the children of Russian spies Donald Heathfield and Tracey Foley....

Economist Detained for Doing Math on an Airplane
From Schneier on Security

Economist Detained for Doing Math on an Airplane

An economics professor was detained when he was spotted doing math on an airplane: On Thursday evening, a 40-year-old man ­-- with dark, curly hair, olive skin...

NIST Starts Planning for Post-Quantum Cryptography
From Schneier on Security

NIST Starts Planning for Post-Quantum Cryptography

Last year, the NSA announced its plans for transitioning to cryptography that is resistant to a quantum computer. Now, it's NIST's turn. Its just-released report...

Friday Squid Blogging: Firefly Squid in the News
From Schneier on Security

Friday Squid Blogging: Firefly Squid in the News

It's a good time to see firefly squid in Japan. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered...

Dilbert on Electronic Voting Machines
From Schneier on Security

Dilbert on Electronic Voting Machines

Accurate (the cartoon, not the machines)....

White House Report on Big Data Discrimination
From Schneier on Security

White House Report on Big Data Discrimination

The White House has released a report on big-data discrimination. From the blog post: Using case studies on credit lending, employment, higher education, and criminal...

Own a Pair of Clipper Chips
From Schneier on Security

Own a Pair of Clipper Chips

The AT&T TSD was an early 1990s telephone encryption device. It was digital. Voice quality was okay. And it was the device that contained the infamous Clipper Chip...

$7 Million Social Media Privacy Mistake
From Schneier on Security

$7 Million Social Media Privacy Mistake

Forbes estimates that football player Laremy Tunsil lost $7 million in salary because of an ill-advised personal video made public....

Credential Stealing as an Attack Vector
From Schneier on Security

Credential Stealing as an Attack Vector

Traditional computer security concerns itself with vulnerabilities. We employ antivirus software to detect malware that exploits vulnerabilities. We have automatic...

Julian Sanchez on the Feinstein-Burr Bill
From Schneier on Security

Julian Sanchez on the Feinstein-Burr Bill

Two excellent posts....

Fake Security Conferences
From Schneier on Security

Fake Security Conferences

Turns out there are two different conferences with the title International Conference on Cyber Security (ICCS 2016), one real and one fake. Richard Clayton has...

Vulnerabilities in Samsung's SmartThings
From Schneier on Security

Vulnerabilities in Samsung's SmartThings

Interesting research: Earlence Fernandes, Jaeyeon Jung, and Atul Prakash, "Security Analysis of Emerging Smart Home Applications": Abstract: Recently, several competing...

Friday Squid Blogging: Global Squid Shortage
From Schneier on Security

Friday Squid Blogging: Global Squid Shortage

There's a squid shortage along the Pacific coast of the Americas. As usual, you can also use this squid post to talk about the security stories in the news that...

I'm Writing a Book on Security
From Schneier on Security

I'm Writing a Book on Security

I'm writing a book on security in the highly connected Internet-of-Things World. Tentative title: Click Here to Kill Everything Peril and Promise in a Hyper-connected...

Documenting the Chilling Effects of NSA Surveillance
From Schneier on Security

Documenting the Chilling Effects of NSA Surveillance

In Data and Golliath, I talk about the self-censorship that comes along with broad surveillance. This interesting research documents this phenomenon in Wikipedia...

Amazon Unlimited Fraud
From Schneier on Security

Amazon Unlimited Fraud

Amazon Unlimited is a all-you-can-read service. You pay one price and can read anything that's in the program. Amazon pays authors out of a fixed pool, on the basis...

Two Good Readings on the Encryption "Going Dark" Debate
From Schneier on Security

Two Good Readings on the Encryption "Going Dark" Debate

Testimonies of Matt Blaze and Danny Weitzner, both on April 19th before the House Energy and Commerce Committee. And the hearing....
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account