acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Modern Mass Surveillance: Identify, Correlate, Discriminate
From Schneier on Security

Modern Mass Surveillance: Identify, Correlate, Discriminate

Communities across the United States are starting to ban facial recognition technologies. In May of last year, San Francisco banned facial recognition; the neighboring...

Smartphone Election in Washington State
From Schneier on Security

Smartphone Election in Washington State

This year: King County voters will be able to use their name and birthdate to log in to a Web portal through the Internet browser on their phones, says Bryan Finney...

Friday Squid Blogging: More on the Giant Squid's DNA
From Schneier on Security

Friday Squid Blogging: More on the Giant Squid's DNA

Following on from last week's post, here's more information on sequencing the DNA of the giant squid. As usual, you can also use this squid post to talk about the...

Technical Report of the Bezos Phone Hack
From Schneier on Security

Technical Report of the Bezos Phone Hack

Motherboard obtained and published the technical report on the hack of Jeff Bezos's phone, which is being attributed to Saudi Arabia, specifically to Crown Prince...

Apple Abandoned Plans for Encrypted iCloud Backup after FBI Complained
From Schneier on Security

Apple Abandoned Plans for Encrypted iCloud Backup after FBI Complained

This is new from Reuters: More than two years ago, Apple told the FBI that it planned to offer users end-to-end encryption when storing their phone data on iCloud...

Half a Million IoT Device Passwords Published
From Schneier on Security

Half a Million IoT Device Passwords Published

It's a list of easy-to-guess passwords for IoT devices on the Internet as recently as last October and November. Useful for anyone putting together a bot network...

Brazil Charges Glenn Greenwald with Cybercrimes
From Schneier on Security

Brazil Charges Glenn Greenwald with Cybercrimes

Glenn Greenwald has been charged with cybercrimes in Brazil, stemming from publishing information and documents that were embarrassing to the government. The charges...

SIM Hijacking
From Schneier on Security

SIM Hijacking

SIM hijacking -- or SIM swapping -- is an attack where a fraudster contacts your cell phone provider and convinces them to switch your account to a phone that they...

Clearview AI and Facial Recognition
From Schneier on Security

Clearview AI and Facial Recognition

The New York Times has a long story about Clearview AI, a small company that scrapes identified photos of people from pretty much everywhere, and then uses unstated...

Friday Squid Blogging: Giant Squid Genome Analyzed
From Schneier on Security

Friday Squid Blogging: Giant Squid Genome Analyzed

This is fantastic work: In total, the researchers identified approximately 2.7 billion DNA base pairs, which is around 90 percent the size of the human genome....

Securing Tiffany's Move
From Schneier on Security

Securing Tiffany's Move

Story of how Tiffany & Company moved all of its inventory from one store to another. Short summary: careful auditing and a lot of police....

Critical Windows Vulnerability Discovered by NSA
From Schneier on Security

Critical Windows Vulnerability Discovered by NSA

Yesterday's Microsoft Windows patches included a fix for a critical vulnerability in the system's crypto library. A spoofing vulnerability exists in the way Windows...

Upcoming Speaking Engagements
From Schneier on Security

Upcoming Speaking Engagements

This is a current list of where and when I am scheduled to speak: I'm speaking at Indiana University Bloomington on January 30, 2020. I'll be at RSA Conference...

5G Security
From Schneier on Security

5G Security

The security risks inherent in Chinese-made 5G networking equipment are easy to understand. Because the companies that make the equipment are subservient to the...

Artificial Personas and Public Discourse
From Schneier on Security

Artificial Personas and Public Discourse

Presidential-campaign season is officially, officially, upon us now, which means it's time to confront the weird and insidious ways in which technology is warping...

Friday Squid Blogging: Stuffed Squid with Vegetables and Pancetta
From Schneier on Security

Friday Squid Blogging: Stuffed Squid with Vegetables and Pancetta

A Croatian recipe. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines...

Police Surveillance Tools from Special Services Group
From Schneier on Security

Police Surveillance Tools from Special Services Group

Special Services Group, a company that sells surveillance tools to the FBI, DEA, ICE, and other US government agencies, has had its secret sales brochure published...

New SHA-1 Attack
From Schneier on Security

New SHA-1 Attack

There's a new, practical, collision attack against SHA-1: In this paper, we report the first practical implementation of this attack, and its impact on real-world...

USB Cable Kill Switch for Laptops
From Schneier on Security

USB Cable Kill Switch for Laptops

BusKill is designed to wipe your laptop (Linux only) if it is snatched from you in a public place: The idea is to connect the BusKill cable to your Linux laptop...

Mailbox Master Keys
From Schneier on Security

Mailbox Master Keys

Here's a physical-world example of why master keys are a bad idea. It's a video of two postal thieves using a master key to open apartment building mailboxes. Changing...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account