acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Tracking by Smart TVs
From Schneier on Security

Tracking by Smart TVs

Long Twitter thread about the tracking embedded in modern digital televisions. The thread references three academic papers....

Measuring the Security of IoT Devices
From Schneier on Security

Measuring the Security of IoT Devices

In August, CyberITL completed a large-scale survey of software security practices in the IoT environment, by looking at the compiled software. Data Collected: 22...

New Research into Russian Malware
From Schneier on Security

New Research into Russian Malware

There's some interesting new research about Russian APT malware: The Russian government has fostered competition among the three agencies, which operate independently...

NSA on the Future of National Cybersecurity
From Schneier on Security

NSA on the Future of National Cybersecurity

Glenn Gerstell, the General Counsel of the NSA, wrote a long and interesting op-ed for the New York Times where he outlined a long list of cyber risks facing the...

Supply-Chain Security and Trust
From Schneier on Security

Supply-Chain Security and Trust

The United States government's continuing disagreement with the Chinese company Huawei underscores a much larger problem with computer technologies in general:...

Friday Squid Blogging: Did Super-Intelligent Giant Squid Steal an Underwater Research Station?
From Schneier on Security

Friday Squid Blogging: Did Super-Intelligent Giant Squid Steal an Underwater Research Station?

There's no proof they did, but there's no proof they didn't. As usual, you can also use this squid post to talk about the security stories in the news that I haven't...

Superhero Movies and Security Lessons
From Schneier on Security

Superhero Movies and Security Lessons

A paper I co-wrote was just published in Security Journal: "Superheroes on screen: real life lessons for security debates": Abstract: Superhero films and episodic...

On Chinese "Spy Trains"
From Schneier on Security

On Chinese "Spy Trains"

The trade war with China has reached a new industry: subway cars. Congress is considering legislation that would prevent the world's largest train maker, the Chinese...

Ineffective Package Tracking Facilitates Fraud
From Schneier on Security

Ineffective Package Tracking Facilitates Fraud

This article discusses an e-commerce fraud technique in the UK. Because the Royal Mail only tracks packages to the postcode -- and not to the address - it's possible...

Russians Hack FBI Comms System
From Schneier on Security

Russians Hack FBI Comms System

Yahoo News reported that the Russians have successfully targeted an FBI communications system: American officials discovered that the Russians had dramatically...

A Feminist Take on Information Privacy
From Schneier on Security

A Feminist Take on Information Privacy

Maria Farrell has a really interesting framing of information/device privacy: What our smartphones and relationship abusers share is that they both exert power...

France Outlines Its Approach to Cyberwar
From Schneier on Security

France Outlines Its Approach to Cyberwar

In a document published earlier this month (in French), France described the legal framework in which it will conduct cyberwar operations. Lukasz Olejnik explains...

Friday Squid Blogging: Piglet Squid
From Schneier on Security

Friday Squid Blogging: Piglet Squid

Another piglet squid video. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting...

Crown Sterling Claims to Factor RSA Keylengths First Factored Twenty Years Ago
From Schneier on Security

Crown Sterling Claims to Factor RSA Keylengths First Factored Twenty Years Ago

Earlier this month I made fun of a company called Crown-Sterling, for...for...for being a company that deserves being made fun of. This morning, the company announced...

New Biometrics
From Schneier on Security

New Biometrics

This article discusses new types of biometrics under development, including gait, scent, heartbeat, microbiome, and butt shape (no, really)....

Revisiting Software Vulnerabilities in the Boeing 787
From Schneier on Security

Revisiting Software Vulnerabilities in the Boeing 787

I previously blogged about a Black Hat talk that disclosed security vulnerabilities in the Boeing 787 software. Ben Rothke concludes that the vulnerabilities are...

I'm Looking to Hire a Strategist to Help Figure Out Public-Interest Tech
From Schneier on Security

I'm Looking to Hire a Strategist to Help Figure Out Public-Interest Tech

I am in search of a strategic thought partner: a person who can work closely with me over the next 9 to 12 months in assessing what's needed to advance the practice...

Cracking Forgotten Passwords
From Schneier on Security

Cracking Forgotten Passwords

Expandpass is a string expansion program. It's "useful for cracking passwords you kinda-remember." You tell the program what you remember about the password and...

Another Side Channel in Intel Chips
From Schneier on Security

Another Side Channel in Intel Chips

Not that serious, but interesting: In late 2011, Intel introduced a performance enhancement to its line of server processors that allowed network cards and other...

Upcoming Speaking Engagements
From Schneier on Security

Upcoming Speaking Engagements

This is a current list of where and when I am scheduled to speak: I'm speaking at University College London on September 23, 2019. I'm speaking at World's Top 50...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account