acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

High-tech Cheating on Exams
From Schneier on Security

High-tech Cheating on Exams

India is cracking down on people who use technology to cheat on exams: Candidates have been told to wear light clothes with half-sleeves, and shirts that do not...

Organizational Doxing
From Schneier on Security

Organizational Doxing

Recently, WikiLeaks began publishing over half a million previously secret cables and other documents from the Foreign Ministry of Saudi Arabia. It's a huge trove...

The Risks of Mandating Back Doors in Encryption Products
From Schneier on Security

The Risks of Mandating Back Doors in Encryption Products

Monday a group of cryptographers and security experts released a major paper outlining the risks of government-mandated back-doors in encryption products: Keys...

Amazon Is Analyzing the Personal Relationships of Its Reviewers
From Schneier on Security

Amazon Is Analyzing the Personal Relationships of Its Reviewers

This is an interesting story of a reviewer who had her reviewer deleted because Amazon believed she knew the author personally. Leaving completely aside the ethics...

More on Hacking Team
From Schneier on Security

More on Hacking Team

Read this: Hacking Team asked its customers to shut down operations, but according to one of the leaked files, as part of Hacking Team's "crisis procedure," it...

More about the NSA's XKEYSCORE
From Schneier on Security

More about the NSA's XKEYSCORE

I've been reading through the 48 classified documents about the NSA's XKEYSCORE system released by the Intercept last week. From the article: The NSA's XKEYSCORE...

Hacking Team Is Hacked
From Schneier on Security

Hacking Team Is Hacked

Someone hacked the cyberweapons arms manufacturer Hacking Team and posted 400 GB of internal company data. Hacking Team is a pretty sleazy company, selling surveillance...

NSA German Intercepts
From Schneier on Security

NSA German Intercepts

On Friday, WikiLeaks published three summaries of NSA intercepts of German government communications. To me, the most interesting thing is not the intercept analyses...

Friday Squid Blogging: Squid Fishing in the Gulf of Thailand
From Schneier on Security

Friday Squid Blogging: Squid Fishing in the Gulf of Thailand

Long article about a very lucrative squid-fishing industry that involves bribing the Cambodian Navy. As usual, you can also use this squid post to talk about the...

Rabbit Beating Up Snake
From Schneier on Security

Rabbit Beating Up Snake

It's the Internet, which means there must be cute animal videos on this blog. But this one is different. Watch a mother rabbit beat up a snake to protect her children...

Clever System of Secure Distributed Computation
From Schneier on Security

Clever System of Secure Distributed Computation

This is really clever: Enigma's technique -- what cryptographers call "secure multiparty computation" -- works by mimicking a few of the features of bitcoin's decentralized...

Details of the NSA's XKEYSCORE
From Schneier on Security

Details of the NSA's XKEYSCORE

The Intercept has published a highly detailed two-part article on how the NSA's XKEYSCORE works, including a huge number of related documents from the Snowden archive...

Office of Personnel Management Data Hack
From Schneier on Security

Office of Personnel Management Data Hack

I don't have much to say about the recent hack of the US Office of Personnel Management, which has been attributed to China (and seems to be getting worse all the...

Twitter Followers: Please Use the Correct Feed
From Schneier on Security

Twitter Followers: Please Use the Correct Feed

The official Twitter feed for my blog is @schneierblog. The account @Bruce_Schneier also mirrors my blog, but it is not mine. I have nothing to do with it, and...

Tracking the Psychological Effects of the 9/11 Attacks
From Schneier on Security

Tracking the Psychological Effects of the 9/11 Attacks

Interesting research from 2012: "The Dynamics of Evolving Beliefs, Concerns, Emotions, and Behavioral Avoidance Following 9/11: A Longitudinal Analysis of Representative...

TEMPEST Attack
From Schneier on Security

TEMPEST Attack

There's a new paper on a low-cost TEMPEST attack against PC cryptography: We demonstrate the extraction of secret decryption keys from laptop computers, by nonintrusively...

Migrating from SHA-1 to SHA-2
From Schneier on Security

Migrating from SHA-1 to SHA-2

Here's a comprehensive document on migrating from SHA-1 to SHA-2 in Active Directory certificates....

Friday Squid Blogging: Classic Gary Larson Squid Cartoon
From Schneier on Security

Friday Squid Blogging: Classic Gary Larson Squid Cartoon

I have always liked this one. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Other GCHQ News from Snowden
From Schneier on Security

Other GCHQ News from Snowden

There are two other Snowden stories this week about GCHQ: one about its hacking practices, and the other about its propaganda and psychology research. The second...

NSA and GCHQ Attacked Antivirus Companies
From Schneier on Security

NSA and GCHQ Attacked Antivirus Companies

On Monday, the Intercept published a new story from the Snowden documents: The spy agencies have reverse engineered software products, sometimes under questionable...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account