acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Data and Goliath's Big Idea
From Schneier on Security

Data and Goliath's Big Idea

Data and Goliath is a book about surveillance, both government and corporate. It's an exploration in three parts: what's happening, why it matters, and what to...

FREAK: Security Rollback Attack Against SSL
From Schneier on Security

FREAK: Security Rollback Attack Against SSL

This week we learned about an attack called "FREAK" -- "Factoring Attack on RSA-EXPORT Keys" -- that can break the encryption of many websites. Basically, some...

The TSA's FAST Personality Screening Program Violates the Fourth Amendment
From Schneier on Security

The TSA's FAST Personality Screening Program Violates the Fourth Amendment

New law journal article: "A Slow March Towards Thought Crime: How the Department of Homeland Security's FAST Program Violates the Fourth Amendment," by Christopher...

Now Corporate Drones are Spying on Cell Phones
From Schneier on Security

Now Corporate Drones are Spying on Cell Phones

The marketing firm Adnear is using drones to track cell phone users: The capture does not involve conversations or personally identifiable information, according...

Tom Ridge Can Find Terrorists Anywhere
From Schneier on Security

Tom Ridge Can Find Terrorists Anywhere

One of the problems with our current discourse about terrorism and terrorist policies is that the people entrusted with counterterrorism -- those whose job it is...

Data and Goliath: Reviews and Excerpts
From Schneier on Security

Data and Goliath: Reviews and Excerpts

On the net right now, there are excerpts from the Introduction on Scientific American, Chapter 5 on the Atlantic, Chapter 6 on the Blaze, Chapter 8 on Ars Technica...

Google Backs Away from Default Lollipop Encryption
From Schneier on Security

Google Backs Away from Default Lollipop Encryption

Lillipop encryption by default is still in the future. No conspiracy here; it seems like they don't have the appropriate drivers yet. But while relaxing the requirement...

The Democratization of Cyberattack
From Schneier on Security

The Democratization of Cyberattack

The thing about infrastructure is that everyone uses it. If it's secure, it's secure for everyone. And if it's insecure, it's insecure for everyone. This forces...

Friday Squid Blogging: Humboldt Squid Communicate by Flashing Each Other
From Schneier on Security

Friday Squid Blogging: Humboldt Squid Communicate by Flashing Each Other

Scientists are attaching cameras to Humboldt squid to watch them communicate with each other. As usual, you can also use this squid post to talk about the security...

Data and Goliath Book Tour
From Schneier on Security

Data and Goliath Book Tour

Over the next two weeks, I am speaking about my new book -- Data and Goliath, if you've missed it -- in New York, Boston, Washington, DC, Seattle, San Francisco...

Everyone Wants You To Have Security, But Not from Them
From Schneier on Security

Everyone Wants You To Have Security, But Not from Them

In December, Google's Executive Chairman Eric Schmidt was interviewed at the CATO Institute Surveillance Conference. One of the things he said, after talking about...

Snowden-Greenwald-Poitras AMA
From Schneier on Security

Snowden-Greenwald-Poitras AMA

Glenn Greenwald, Laura Poitras, and Edward Snowden did an "Ask Me Anything" on Reddit. Point out anything interesting in the comments. And note that Snowden mentioned...

"Surreptitiously Weakening Cryptographic Systems"
From Schneier on Security

"Surreptitiously Weakening Cryptographic Systems"

New paper: "Surreptitiously Weakening Cryptographic Systems," by Bruce Schneier, Matthew Fredrikson, Tadayoshi Kohno, and Thomas Ristenpart. Abstract: Revelations...

Twitpic
From Schneier on Security

Twitpic

On Monday, I asked Adm. Rogers a question. EDITED TO ADD: The question....

AT&T Charging Customers to Not Spy on Them
From Schneier on Security

AT&T Charging Customers to Not Spy on Them

AT&T is charging a premium for gigabit Internet service without surveillance: The tracking and ad targeting associated with the gigabit service cannot be avoided...

Cell Phones Leak Location Information through Power Usage
From Schneier on Security

Cell Phones Leak Location Information through Power Usage

New research on tracking the location of smart phone users by monitoring power consumption: PowerSpy takes advantage of the fact that a phone's cellular transmissions...

Friday Squid Blogging: Squid Can Recode Their Genetic Makeup
From Schneier on Security

Friday Squid Blogging: Squid Can Recode Their Genetic Makeup

This is freaky: A new study showcases the first example of an animal editing its own genetic makeup on-the-fly to modify most of its proteins, enabling adjustments...

Man-in-the-Middle Attacks on Lenovo Computers
From Schneier on Security

Man-in-the-Middle Attacks on Lenovo Computers

It's not just national intelligence agencies that break your https security through man-in-the-middle attacks. Corporations do it, too. For the past few months,...

NSA/GCHQ Hacks SIM Card Database and Steals Billions of Keys
From Schneier on Security

NSA/GCHQ Hacks SIM Card Database and Steals Billions of Keys

The Intercept has an extraordinary story: the NSA and/or GCHQ hacked into the Dutch SIM card manufacturer Gemalto, stealing the encryption keys for billions of...

Database of Ten Million Passwords
From Schneier on Security

Database of Ten Million Passwords

Earlier this month, Mark Burnett released a database of ten million usernames and passwords. He collected this data from already-public dumps from hackers who had...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account