acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

LA Covers Up Bad Cybersecurity
From Schneier on Security

LA Covers Up Bad Cybersecurity

This is bad in several dimensions. The Los Angeles Department of Water and Power has been accused of deliberately keeping widespread gaps in its cybersecurity a...

CIA Dirty Laundry Aired
From Schneier on Security

CIA Dirty Laundry Aired

Joshua Schulte, the CIA employee standing trial for leaking the Wikileaks Vault 7 CIA hacking tools, maintains his innocence. And during the trial, a lot of shoddy...

Cybersecurity Law Casebook
From Schneier on Security

Cybersecurity Law Casebook

Robert Chesney teaches cybersecurity at the University of Texas School of Law. He recently published a fantastic casebook, which is a good source for anyone studying...

Friday Squid Blogging: The Effect of Noise on Squid
From Schneier on Security

Friday Squid Blogging: The Effect of Noise on Squid

Two articles. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines...

More on Crypto AG
From Schneier on Security

More on Crypto AG

One follow-on to the story of Crypto AG being owned by the CIA: this interview with a Washington Post reporter. The whole thing is worth reading or listening to...

Security of Health Information
From Schneier on Security

Security of Health Information

The world is racing to contain the new COVID-19 virus that is spreading around the globe with alarming speed. Right now, pandemic disease experts at the World Health...

Let's Encrypt Vulnerability
From Schneier on Security

Let's Encrypt Vulnerability

The BBC is reporting a vulnerability in the Let's Encrypt certificate service: In a notification email to its clients, the organisation said: "We recently discovered...

Wi-Fi Chip Vulnerability
From Schneier on Security

Wi-Fi Chip Vulnerability

There's a vulnerability in Wi-Fi hardware that breaks the encryption: The vulnerability exists in Wi-Fi chips made by Cypress Semiconductor and Broadcom, the latter...

Facebook's Download-Your-Data Tool Is Incomplete
From Schneier on Security

Facebook's Download-Your-Data Tool Is Incomplete

Privacy International has the details: Key facts: Despite Facebook claim, "Download Your Information" doesn't provide users with a list of all advertisers who uploaded...

Friday Squid Blogging: Squid Eggs
From Schneier on Security

Friday Squid Blogging: Squid Eggs

Cool photo. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here...

Humble Bundle's 2020 Cybersecurity Books
From Schneier on Security

Humble Bundle's 2020 Cybersecurity Books

For years, Humble Bundle has been selling great books at a "pay what you can afford" model. This month, they're featuring as many as nineteen cybersecurity books...

Deep Learning to Find Malicious Email Attachments
From Schneier on Security

Deep Learning to Find Malicious Email Attachments

Google presented its system of using deep-learning techniques to identify malicious email attachments: At the RSA security conference in San Francisco on Tuesday...

Securing the Internet of Things through Class-Action Lawsuits
From Schneier on Security

Securing the Internet of Things through Class-Action Lawsuits

This law journal article discusses the role of class-action litigation to secure the Internet of Things. Basically, the article postulates that (1) market realities...

Newly Declassified Study Demonstrates Uselessness of NSA's Phone Metadata Program
From Schneier on Security

Newly Declassified Study Demonstrates Uselessness of NSA's Phone Metadata Program

The New York Times is reporting on the NSA's phone metadata program, which the NSA shut down last year: A National Security Agency system that analyzed logs of...

Firefox Enables DNS over HTTPS
From Schneier on Security

Firefox Enables DNS over HTTPS

This is good news: Whenever you visit a website -- even if it's HTTPS enabled -- the DNS query that converts the web address into an IP address that computers can...

Russia Is Trying to Tap Transatlantic Cables
From Schneier on Security

Russia Is Trying to Tap Transatlantic Cables

The Times of London is reporting that Russian agents are in Ireland probing transatlantic communications cables. Ireland is the landing point for undersea cables...

Friday Squid Blogging: 13-foot Giant Squid Caught off New Zealand Coast
From Schneier on Security

Friday Squid Blogging: 13-foot Giant Squid Caught off New Zealand Coast

It's probably a juvenile: Researchers aboard the New Zealand-based National Institute of Water and Atmospheric Research Ltd (NIWA) research vessel Tangaroa were...

Inrupt, Tim Berners-Lee's Solid, and Me
From Schneier on Security

Inrupt, Tim Berners-Lee's Solid, and Me

For decades, I have been talking about the importance of individual privacy. For almost as long, I have been using the metaphor of digital feudalism to describe...

Policy vs Technology
From Schneier on Security

Policy vs Technology

Sometime around 1993 or 1994, during the first Crypto Wars, I was part of a group of cryptography experts that went to Washington to advocate for strong encryption...

Internet of Things Candle
From Schneier on Security

Internet of Things Candle

There's a Kickstarter for an actual candle, with real fire, that you can control over the Internet. What could possibly go wrong?...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account