acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

How Privacy Laws Hurt Defendants
From Schneier on Security

How Privacy Laws Hurt Defendants

Rebecca Wexler has an interesting op-ed about an inadvertent harm that privacy laws can cause: while law enforcement can often access third-party data to aid in...

Facebook Plans on Backdooring WhatsApp
From Schneier on Security

Facebook Plans on Backdooring WhatsApp

This article points out that Facebook's planned content moderation scheme will result in an encryption backdoor into WhatsApp: In Facebook's vision, the actual...

Another Attack Against Driverless Cars
From Schneier on Security

Another Attack Against Driverless Cars

In this piece of research, attackers successfully attack a driverless car system -- Renault Captur's "Level 0" autopilot (Level 0 systems advise human drivers but...

ACLU on the GCHQ Backdoor Proposal
From Schneier on Security

ACLU on the GCHQ Backdoor Proposal

Back in January, two senior GCHQ officials proposed a specific backdoor for communications systems. It was universally derided as unworkable -- by me, as well....

Wanted: Cybersecurity Imagery
From Schneier on Security

Wanted: Cybersecurity Imagery

Eli Sugarman of the Hewlettt Foundation laments about the sorry state of cybersecurity imagery: The state of cybersecurity imagery is, in a word, abysmal. A simple...

Friday Squid Blogging: Humbolt Squid in Mexico is Getting Smaller
From Schneier on Security

Friday Squid Blogging: Humbolt Squid in Mexico is Getting Smaller

The Humbolt squid are getting smaller: Rawley and the other researchers found a flurry of factors that drove the jumbo squid's demise. The Gulf of California historically...

Insider Logic Bombs
From Schneier on Security

Insider Logic Bombs

Add to the "not very smart criminals" file: According to court documents, Tinley provided software services for Siemens' Monroeville, PA offices for nearly ten...

Software Developers and Security
From Schneier on Security

Software Developers and Security

According to a survey: "68% of the security professionals surveyed believe it's a programmer's job to write secure code, but they also think less than half of developers...

Attorney General William Barr on Encryption Policy
From Schneier on Security

Attorney General William Barr on Encryption Policy

Yesterday, Attorney General William Barr gave a major speech on encryption policy -- what is commonly known as "going dark." Speaking at Fordham University in New...

Science Fiction Writers Helping Imagine Future Threats
From Schneier on Security

Science Fiction Writers Helping Imagine Future Threats

The French army is going to put together a team of science fiction writers to help imagine future threats. Leaving aside the question of whether science fiction...

Hackers Expose Russian FSB Cyberattack Projects
From Schneier on Security

Hackers Expose Russian FSB Cyberattack Projects

More nation-state activity in cyberspace, this time from Russia: Per the different reports in Russian media, the files indicate that SyTech had worked since 2009...

Friday Squid Blogging: Squid Mural
From Schneier on Security

Friday Squid Blogging: Squid Mural

Large squid mural in the Bushwick neighborhood of Brooklyn. As usual, you can also use this squid post to talk about the security stories in the news that I haven't...

A Harlequin Romance Novel about Hackers
From Schneier on Security

A Harlequin Romance Novel about Hackers

Really....

John Paul Stevens Was a Cryptographer
From Schneier on Security

John Paul Stevens Was a Cryptographer

I didn't know that Supreme Court Justice John Paul Stevens "was also a cryptographer for the Navy during World War II." He was a proponent of individual privacy...

Identity Theft on the Job Market
From Schneier on Security

Identity Theft on the Job Market

Identity theft is getting more subtle: "My job application was withdrawn by someone pretending to be me": When Mr Fearn applied for a job at the company he didn't...

Zoom Vulnerability
From Schneier on Security

Zoom Vulnerability

The Zoom conferencing app has a vulnerability that allows someone to remotely take over the computer's camera. It's a bad vulnerability, made worse by the fact...

Palantir's Surveillance Service for Law Enforcement
From Schneier on Security

Palantir's Surveillance Service for Law Enforcement

Motherboard got its hands on Palantir's Gotham user's manual, which is used by the police to get information on people: The Palantir user guide shows that police...

Upcoming Speaking Engagements
From Schneier on Security

Upcoming Speaking Engagements

This is a current list of where and when I am scheduled to speak: I'm speaking at Black Hat USA 2019 in Las Vegas on Wednesday, August 7 and Thurdsay, August 8,...

Friday Squid Blogging: When the Octopus and Squid Lost Their Shells
From Schneier on Security

Friday Squid Blogging: When the Octopus and Squid Lost Their Shells

Cephalopod ancestors once had shells. When did they lose them? With the molecular clock technique, which allowed him to use DNA to map out the evolutionary history...

Clickable Endnotes to Click Here to Kill Everybody
From Schneier on Security

Clickable Endnotes to Click Here to Kill Everybody

In Click Here to Kill Everybody, I promised clickable endnotes. They're finally available....
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account