acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Upcoming Speaking Engagements
From Schneier on Security

Upcoming Speaking Engagements

This is a current list of where and when I am scheduled to speak: I'm speaking at A New Initiative for Poland in Warsaw, January 16-17, 2019. I'm speaking at the...

Why Internet Security Is So Bad
From Schneier on Security

Why Internet Security Is So Bad

I recently read two different essays that make the point that while Internet security is terrible, it really doesn't affect people enough to make it an issue. This...

Friday Squid Blogging: New Giant Squid Video
From Schneier on Security

Friday Squid Blogging: New Giant Squid Video

This is a fantastic video of a young giant squid named Heck swimming around Toyama Bay near Tokyo. As usual, you can also use this squid post to talk about the...

Using a Fake Hand to Defeat Hand-Vein Biometrics
From Schneier on Security

Using a Fake Hand to Defeat Hand-Vein Biometrics

Nice work: One attraction of a vein based system over, say, a more traditional fingerprint system is that it may be typically harder for an attacker to learn how...

Security Vulnerabilities in Cell Phone Systems
From Schneier on Security

Security Vulnerabilities in Cell Phone Systems

Good essay on the inherent vulnerabilities in the cell phone standards and the market barriers to fixing them. So far, industry and policymakers have largely dragged...

EU Offering Bug Bounties on Critical Open-Source Software
From Schneier on Security

EU Offering Bug Bounties on Critical Open-Source Software

The EU is offering "bug bounties on Free Software projects that the EU institutions rely on." Slashdot thread....

Machine Learning to Detect Software Vulnerabilities
From Schneier on Security

Machine Learning to Detect Software Vulnerabilities

No one doubts that artificial intelligence (AI) and machine learning (ML) will transform cybersecurity. We just don't know how, or when. While the literature generally...

New Attack Against Electrum Bitcoin Wallets
From Schneier on Security

New Attack Against Electrum Bitcoin Wallets

This is clever: How the attack works: Attacker added tens of malicious servers to the Electrum wallet network. Users of legitimate Electrum wallets initiate a Bitcoin...

Friday Squid Blogging: The Future of the Squid Market
From Schneier on Security

Friday Squid Blogging: The Future of the Squid Market

It's growing. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines...

Podcast Interview with Eva Gaperon
From Schneier on Security

Podcast Interview with Eva Gaperon

Nice interview with the EFF's director of cybersecurity, Eva Gaperon....

Long-Range Familial Searching Forensics
From Schneier on Security

Long-Range Familial Searching Forensics

Good article on using long-range familial searching -- basically, DNA matching of distant relatives -- as a police forensics tool....

China's APT10
From Schneier on Security

China's APT10

Wired has an excellent article on China's APT10 hacking group. Specifically, on how they hacked managed service providers in order to get to their customers' networks...

Friday Squid Blogging: Squid-Focused Menus in Croatia
From Schneier on Security

Friday Squid Blogging: Squid-Focused Menus in Croatia

This is almost over: From 1 December 2018 -- 6 January 2019, Days of Adriatic squid will take place at restaurants all over north-west Istria. Restaurants will...

Click Here to Kill Everybody Available as an Audiobook
From Schneier on Security

Click Here to Kill Everybody Available as an Audiobook

Click Here to Kill Everybody is finally available on Audible.com. I have ten download codes. Not having anything better to do with them, here they are: HADQSSFC98WCQ...

Massive Ad Fraud Scheme Relied on BGP Hijacking
From Schneier on Security

Massive Ad Fraud Scheme Relied on BGP Hijacking

This is a really interesting story of an ad fraud scheme that relied on hijacking the Border Gateway Protocol: Members of 3ve (pronounced "eve") used their large...

Stealing Nativity Displays
From Schneier on Security

Stealing Nativity Displays

The New York Times is reporting on the security measures people are using to protect nativity displays....

Human Rights by Design
From Schneier on Security

Human Rights by Design

Good essay: "Advancing Human-Rights-By-Design In The Dual-Use Technology Industry," by Jonathon Penney, Sarah McKune, Lex Gill, and Ronald J. Deibert: But businesses...

Glitter Bomb against Package Thieves
From Schneier on Security

Glitter Bomb against Package Thieves

Stealing packages from unattended porches is a rapidly rising crime, as more of us order more things by mail. One person hid a glitter bomb and a video recorder...

MD5 and SHA-1 Still Used in 2018
From Schneier on Security

MD5 and SHA-1 Still Used in 2018

Last week, the Scientific Working Group on Digital Evidence published a draft document -- "SWGDE Position on the Use of MD5 and SHA1 Hash Algorithms in Digital...

Friday Squid Blogging: Illegal North Korean Squid Fishing
From Schneier on Security

Friday Squid Blogging: Illegal North Korean Squid Fishing

North Korea is engaged in even more illegal squid fishing than previously. As usual, you can also use this squid post to talk about the security stories in the...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account