acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Reforming the FISA Court
From Schneier on Security

Reforming the FISA Court

The Brennan Center has a long report on what's wrong with the FISA Court and how to fix it. At the time of its creation, many lawmakers saw constitutional problems...

BIOS Hacking
From Schneier on Security

BIOS Hacking

We've learned a lot about the NSA's abilities to hack a computer's BIOS so that the hack survives reinstalling the OS. Now we have a research presentation about...

Friday Squid Blogging: Squid Pen
From Schneier on Security

Friday Squid Blogging: Squid Pen

Neat. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

New Paper on Digital Intelligence
From Schneier on Security

New Paper on Digital Intelligence

David Omand -- GCHQ director from 1996-1997, and the UK's security and intelligence coordinator from 2000-2005 -- has just published a new paper: "Understanding...

Cisco Shipping Equipment to Fake Addresses to Foil NSA Interception
From Schneier on Security

Cisco Shipping Equipment to Fake Addresses to Foil NSA Interception

Last May, we learned that the NSA intercepts equipment being shipped around the world and installs eavesdropping implants. There were photos of NSA employees opening...

More Data and Goliath News
From Schneier on Security

More Data and Goliath News

Right now, the book is #6 on the New York Times best-seller list in hardcover nonfiction, and #13 in combined print and e-book nonfiction. This is the March 22...

Understanding the Organizational Failures of Terrorist Organizations
From Schneier on Security

Understanding the Organizational Failures of Terrorist Organizations

New research: Max Abrahms and Philip B.K. Potter, "Explaining Terrorism: Leadership Deficits and Militant Group Tactics," International Organizations. Abstract:...

How We Become Habituated to Security Warnings on Computers
From Schneier on Security

How We Become Habituated to Security Warnings on Computers

New research: "How Polymorphic Warnings Reduce Habituation in the Brain ­- Insights from an fMRI Study." Abstract: Research on security warnings consistently points...

Friday Squid Blogging: Squid Stir-Fry
From Schneier on Security

Friday Squid Blogging: Squid Stir-Fry

Spicy squid masala stir-fry. Easy and delicious. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered...

How the CIA Might Target Apple's XCode
From Schneier on Security

How the CIA Might Target Apple's XCode

The Intercept recently posted a story on the CIA's attempts to hack the iOS operating system. Most interesting was the speculation that it hacked XCode, which would...

Threats to Information Integrity
From Schneier on Security

Threats to Information Integrity

Every year, the Director of National Intelligence publishes an unclassified "Worldwide Threat Assessment." This year's report was published two weeks ago. "Cyber"...

Details on Hacking Team Software Used by Ethiopian Government
From Schneier on Security

Details on Hacking Team Software Used by Ethiopian Government

The Citizen Lab at the University of Toronto published a new report on the use of spyware from the Italian cyberweapons arms manufacturer Hacking Team by the Ethiopian...

Fall Seminar on Catastrophic Risk
From Schneier on Security

Fall Seminar on Catastrophic Risk

I am planning a study group at Harvard University (in Boston) for the Fall semester, on catastrophic risk. Berkman Study Group -- Catastrophic Risk: Technologies...

Data and Goliath Makes New York Times Best-Seller List
From Schneier on Security

Data and Goliath Makes New York Times Best-Seller List

The March 22 best-seller list from the New York Times will list me as #6 in the hardcover nonfiction category, and #13 in the combined paper/e-book category. This...

The Changing Economics of Surveillance
From Schneier on Security

The Changing Economics of Surveillance

Cory Doctorow examines the changing economics of surveillance and what it means: The Stasi employed one snitch for every 50 or 60 people it watched. We can't be...

Equation Group Update
From Schneier on Security

Equation Group Update

More information about the Equation Group, aka the NSA. Kaspersky Labs has published more information about the Equation Group -- that's the NSA -- and its sophisticated...

Hardware Bit-Flipping Attack
From Schneier on Security

Hardware Bit-Flipping Attack

The Project Zero team at Google has posted details of a new attack that targets a computer's' DRAM. It's called Rowhammer. Here's a good description: Here's how...

Can the NSA Break Microsoft's BitLocker?
From Schneier on Security

Can the NSA Break Microsoft's BitLocker?

The Intercept has a new story on the CIA's -- yes, the CIA, not the NSA -- efforts to break encryption. These are from the Snowden documents, and talk about a conference...

Geotagging Twitter Users by Mining Their Social Graphs
From Schneier on Security

Geotagging Twitter Users by Mining Their Social Graphs

New research: Geotagging One Hundred Million Twitter Accounts with Total Variation Minimization," by Ryan Compton, David Jurgens, and David Allen. Abstract: Geographically...

Identifying When Someone is Operating a Computer Remotely
From Schneier on Security

Identifying When Someone is Operating a Computer Remotely

Here's an interesting technique to detect Remote Access Trojans, or RATS: differences in how local and remote users use the keyboard and mouse: By using biometric...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account