acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Zipcar Disruption
From Schneier on Security

Zipcar Disruption

This isn't a security story, but it easily could have been. Last Saturday, Zipcar had a system outage: "an outage experienced by a third party telecommunications...

An Argument that Cybersecurity Is Basically Okay
From Schneier on Security

An Argument that Cybersecurity Is Basically Okay

Andrew Odlyzko's new essay is worth reading -- "Cybersecurity is not very important": Abstract: There is a rising tide of security breaches. There is an even faster...

Triton
From Schneier on Security

Triton

Good article on the Triton malware which targets industrial control systems....

CAs Reissue Over One Million Weak Certificates
From Schneier on Security

CAs Reissue Over One Million Weak Certificates

Turns out that the software a bunch of CAs used to generate public-key certificates was flawed: they created random serial numbers with only 63 bits instead of...

Friday Squid Blogging: A Squid-Related Vacation Tour in Hawaii
From Schneier on Security

Friday Squid Blogging: A Squid-Related Vacation Tour in Hawaii

You can hunt for the Hawaiian bobtail squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read...

I Was Cited in a Court Decision
From Schneier on Security

I Was Cited in a Court Decision

An article I co-wrote -- my first law journal article -- was cited by the Massachusetts Supreme Judicial Court -- the state supreme court -- in a case on compelled...

Upcoming Speaking Engagements
From Schneier on Security

Upcoming Speaking Engagements

This is a current list of where and when I am scheduled to speak: I'm teaching a live online class called "Spotlight on Cloud: The Future of Internet Security with...

Critical Flaw in Swiss Internet Voting System
From Schneier on Security

Critical Flaw in Swiss Internet Voting System

Researchers have found a critical flaw in the Swiss Internet voting system. I was going to write an essay about how this demonstrates that Internet voting is a...

DARPA Is Developing an Open-Source Voting System
From Schneier on Security

DARPA Is Developing an Open-Source Voting System

This sounds like a good development: ...a new $10 million contract the Defense Department's Defense Advanced Research Projects Agency (DARPA) has launched to design...

Judging Facebook's Privacy Shift
From Schneier on Security

Judging Facebook's Privacy Shift

Facebook is making a new and stronger commitment to privacy. Last month, the company hired three of its most vociferous critics and installed them in senior technical...

On Surveillance in the Workplace
From Schneier on Security

On Surveillance in the Workplace

Data & Society just published a report entitled "Workplace Monitoring & Surveillance": This explainer highlights four broad trends in employee monitoring and surveillance...

Russia Is Testing Online Voting
From Schneier on Security

Russia Is Testing Online Voting

This is a bad idea: A second innovation will allow "electronic absentee voting" within voters' home precincts. In other words, Russia is set to introduce its first...

Friday Squid Blogging: Squid Proteins Can Be an Alternative to Plastic
From Schneier on Security

Friday Squid Blogging: Squid Proteins Can Be an Alternative to Plastic

Is there anything squids aren't good for? Academic paper. As usual, you can also use this squid post to talk about the security stories in the news that I haven't...

Videos and Links from the Public-Interest Technology Track at the RSA Conference
From Schneier on Security

Videos and Links from the Public-Interest Technology Track at the RSA Conference

Yesterday at the RSA Conference, I gave a keynote talk about the role of public-interest technologists in cybersecurity. (Video here). I also hosted a one-day mini...

Cybersecurity Insurance Not Paying for NotPetya Losses
From Schneier on Security

Cybersecurity Insurance Not Paying for NotPetya Losses

This will complicate things: To complicate matters, having cyber insurance might not cover everyone's losses. Zurich American Insurance Company refused to pay out...

Detecting Shoplifting Behavior
From Schneier on Security

Detecting Shoplifting Behavior

This system claims to detect suspicious behavior that indicates shoplifting: Vaak, a Japanese startup, has developed artificial intelligence software that hunts...

Letterlocking
From Schneier on Security

Letterlocking

Really good article on the now-lost art of letterlocking....

Digital Signatures in PDFs Are Broken
From Schneier on Security

Digital Signatures in PDFs Are Broken

Researchers have demonstrated spoofing of digital signatures in PDF files. This would matter more if PDF digital signatures were widely used. Still, the researchers...

Cybersecurity for the Public Interest
From Schneier on Security

Cybersecurity for the Public Interest

The Crypto Wars have been waging off-and-on for a quarter-century. On one side is law enforcement, which wants to be able to break encryption, to access devices...

The Latest in Creepy Spyware
From Schneier on Security

The Latest in Creepy Spyware

The Nest home alarm system shipped with a secret microphone, which -- according to the company -- was only an accidental secret: On Tuesday, a Google spokesperson...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account