acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Drone Self-Defense and the Law
From Schneier on Security

Drone Self-Defense and the Law

Last month, a Kentucky man shot down a drone that was hovering near his backyard. WDRB News reported that the camera drone's owners soon showed up at the home of...

Cheating News from the Chess World
From Schneier on Security

Cheating News from the Chess World

Chess player caught cheating at a tournament: I kept on looking at him. He was always sitting down, he never got up. It was very strange; we are taking about hours...

FBI and Apple's Encryption
From Schneier on Security

FBI and Apple's Encryption

The New York Times is reporting that Apple encryption is hampering an FBI investigation: In an investigation involving guns and drugs, the Justice Department obtained...

Animals vs. Drones
From Schneier on Security

Animals vs. Drones

It's not just humans who dislike the small flying objects. YouTube has videos of drones being stared at quizzically by a moose, harassed by a raven, attacked by...

The Security Risks of Third-party Data
From Schneier on Security

The Security Risks of Third-party Data

Most of us get to be thoroughly relieved that our emails weren't in the Ashley Madison database. But don't get too comfortable. Whatever secrets you have, even...

TSA Master Keys
From Schneier on Security

TSA Master Keys

Someone recently noticed a Washington Post story on the TSA that originally contained a detailed photograph of all the TSA master keys. It's now blurred out of...

Glenn Greenwald Debates Keith Alexander
From Schneier on Security

Glenn Greenwald Debates Keith Alexander

Interesting debate, surprisingly civil. Alexander seemed to have been okay with Snowden revealing surveillance based on Section 215: "If he had taken the one court...

Understanding Squid Self-Healing Teeth
From Schneier on Security

Understanding Squid Self-Healing Teeth

Using squid teeth as a model, researchers have created "the first material that heals itself in water." Paper from Nature. As usual, you can also use this squid...

I'll be Talking Cyber-Resilience on a Webinar
From Schneier on Security

I'll be Talking Cyber-Resilience on a Webinar

This coming Thursday, I'll be talking with Larry Poneman about cyber-resilience and the results of a new survey he's releasing. Join us here. The event is sponsored...

China's "Great Cannon"
From Schneier on Security

China's "Great Cannon"

Interesting research: "An Analysis of China's 'Great Cannon.'" Abstract: On March 16th, 2015, the Chinese censorship apparatus employed a new tool, the "Great Cannon"...

"The Declining Half-Life of Secrets"
From Schneier on Security

"The Declining Half-Life of Secrets"

Several times I've mentioned Peter Swire's concept of "the declining half-life of secrets." He's finally written it up: The nature of secrets is changing. Secrets...

History of the L0pht
From Schneier on Security

History of the L0pht

This Washington Post article uses the history of the L0pht to talk about the broader issues of Internet security....

What Can you Learn from Metadata?
From Schneier on Security

What Can you Learn from Metadata?

An Australian reporter for the ABC, Will Ockenden published a bunch of his metadata, and asked people to derive various elements of his life. They did pretty well...

Using Samsung's Internet-Enabled Refrigerator for Man-in-the-Middle Attacks
From Schneier on Security

Using Samsung's Internet-Enabled Refrigerator for Man-in-the-Middle Attacks

This is interesting research:: Whilst the fridge implements SSL, it FAILS to validate SSL certificates, thereby enabling man-in-the-middle attacks against most...

Friday Squid Blogging: Cephalopod Anatomy Class
From Schneier on Security

Friday Squid Blogging: Cephalopod Anatomy Class

Beautiful diorama. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Mickens on Security
From Schneier on Security

Mickens on Security

James Mickens, for your amusement. A somewhat random sample: My point is that security people need to get their priorities straight. The "threat model" section...

The Benefits of Endpoint Encryption
From Schneier on Security

The Benefits of Endpoint Encryption

An unofficial blog post from FTC chief technologist Ashkan Soltani on the virtues of strong end-user device controls....

German BfV - NSA Cooperation
From Schneier on Security

German BfV - NSA Cooperation

The German newspaper Zeit is reporting the BfV, Germany's national intelligence agency, (probably) illegally traded data about Germans to the NSA in exchange for...

Iranian Phishing
From Schneier on Security

Iranian Phishing

CitizenLab is reporting on Iranian hacking attempts against activists, which include a real-time man-in-the-middle attack against Google's two-factor authentication...

Defending All the Targets Is Impossible
From Schneier on Security

Defending All the Targets Is Impossible

In the wake of the recent averted mass shooting on the French railroads, officials are realizing that there are just too many potential targets to defend. The sheer...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account