acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Presidential Candidate Andrew Yang Has Quantum Encryption Policy
From Schneier on Security

Presidential Candidate Andrew Yang Has Quantum Encryption Policy

At least one presidential candidate has a policy about quantum computing and encryption. It has two basic planks. One: fund quantum-resistant encryption standards...

Resetting Your GE Smart Light Bulb
From Schneier on Security

Resetting Your GE Smart Light Bulb

If you need to reset the software in your GE smart light bulb -- firmware version 2.8 or later -- just follow these easy instructions: Start with your bulb off...

Details of the Cloud Hopper Attacks
From Schneier on Security

Details of the Cloud Hopper Attacks

Reuters has a long article on the Chinese government APT attack called Cloud Hopper. It was much bigger than originally reported. The hacking campaign, known as...

Cell Networks Hacked by (Probable) Nation-State Attackers
From Schneier on Security

Cell Networks Hacked by (Probable) Nation-State Attackers

A sophisticated attacker has successfuly infiltrated cell providers to collect information on specific users: The hackers have systematically broken in to more...

Cardiac Biometric
From Schneier on Security

Cardiac Biometric

MIT Technology Review is reporting about an infrared laser device that can identify people by their unique cardiac signature at a distance: A new device, developed...

Ransomware Recovery Firms Who Secretly Pay Hackers
From Schneier on Security

Ransomware Recovery Firms Who Secretly Pay Hackers

ProPublica is reporting on companies that pretend to recover data locked up by ransomware, but just secretly pay the hackers and then mark up the cost to the victims...

Friday Squid Blogging: Squid Cars
From Schneier on Security

Friday Squid Blogging: Squid Cars

Jalopnik asks the important question: "If squids ruled the earth, what would their cars be like?" As usual, you can also use this squid post to talk about the security...

Applied Cryptography is Banned in Oregon Prisons
From Schneier on Security

Applied Cryptography is Banned in Oregon Prisons

My Applied Cryptography is on a list of books banned in Oregon prisons. It's not me -- and it's not cryptography -- it's that the prisons ban books that teach people...

Research on Human Honesty
From Schneier on Security

Research on Human Honesty

New research from Science: "Civic honesty around the globe": Abstract: Civic honesty is essential to social capital and economic development, but is often in conflict...

US Journalist Detained When Returning to US
From Schneier on Security

US Journalist Detained When Returning to US

Pretty horrible story of a US journalist who had his computer and phone searched at the border when returning to the US from Mexico. After I gave him the password...

Digital License Plates
From Schneier on Security

Digital License Plates

They're a thing: Developers say digital plates utilize "advanced telematics" -- to collect tolls, pay for parking and send out Amber Alerts when a child is abducted...

Google Releases Basic Homomorphic Encryption Tool
From Schneier on Security

Google Releases Basic Homomorphic Encryption Tool

Google has released an open-source cryptographic tool: Private Join and Compute. From a Wired article: Private Join and Compute uses a 1970s methodology known as...

Yubico Security Keys with a Crypto Flaw
From Schneier on Security

Yubico Security Keys with a Crypto Flaw

Wow, is this an embarrassing bug: Yubico is recalling a line of security keys used by the U.S. government due to a firmware flaw. The company issued a security...

Friday Squid Blogging: Fantastic Video of a Juvenile Giant Squid
From Schneier on Security

Friday Squid Blogging: Fantastic Video of a Juvenile Giant Squid

It's amazing: Then, about 20 hours into the recording from the Medusa's fifth deployment, Dr. Robinson saw the sharp points of tentacles sneaking into the camera's...

I'm Leaving IBM
From Schneier on Security

I'm Leaving IBM

Today is my last day at IBM. If you've been following along, IBM bought my startup Resilient Systems in Spring 2016. Since then, I have been with IBM, holding the...

Cellebrite Claims It Can Unlock Any iPhone
From Schneier on Security

Cellebrite Claims It Can Unlock Any iPhone

The digital forensics company Cellebrite now claims it can unlock any iPhone. I dithered before blogging this, not wanting to give the company more publicity. But...

Spanish Soccer League App Spies on Fans
From Schneier on Security

Spanish Soccer League App Spies on Fans

The Spanish Soccer League's smartphone app spies on fans in order to find bars that are illegally streaming its games. The app listens with the microphone for the...

MongoDB Offers Field Level Encryption
From Schneier on Security

MongoDB Offers Field Level Encryption

MongoDB now has the ability to encrypt data by field: MongoDB calls the new feature Field Level Encryption. It works kind of like end-to-end encrypted messaging...

Person in Latex Mask Impersonated French Minister
From Schneier on Security

Person in Latex Mask Impersonated French Minister

Forget deep fakes. Someone wearing a latex mask fooled people on video calls for a period of two years, successfully scamming 80 million euros from rich French...

Florida City Pays Ransomware
From Schneier on Security

Florida City Pays Ransomware

Learning from the huge expenses Atlanta and Baltimore incurred by refusing to pay ransomware, the Florida City of Riveria Beach decided to pay up. The ransom amount...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account