acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

COPPA Compliance
From Schneier on Security

COPPA Compliance

Interesting research: "'Won't Somebody Think of the Children?' Examining COPPA Compliance at Scale": Abstract: We present a scalable dynamic analysis framework...

Cybersecurity Insurance
From Schneier on Security

Cybersecurity Insurance

Good article about how difficult it is to insure an organization against Internet attacks, and how expensive the insurance is. Companies like retailers, banks,...

The Digital Security Exchange Is Live
From Schneier on Security

The Digital Security Exchange Is Live

Last year I wrote about the Digital Security Exchange. The project is live: The DSX works to strengthen the digital resilience of U.S. civil society groups by improving...

DARPA Funding in AI-Assisted Cybersecurity
From Schneier on Security

DARPA Funding in AI-Assisted Cybersecurity

DARPA is launching a program aimed at vulnerability discovery via human-assisted AI. The new DARPA program is called CHESS (Computers and Humans Exploring Software...

Obscure E-Mail Vulnerability
From Schneier on Security

Obscure E-Mail Vulnerability

This vulnerability is a result of an interaction between two different ways of handling e-mail addresses. Gmail ignores dots in addresses, so bruce.schneier@gmail...

Friday Squid Blogging: Sake Decanters Made of Dried Squid
From Schneier on Security

Friday Squid Blogging: Sake Decanters Made of Dried Squid

This is interesting. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines...

Subverting Backdoored Encrryption
From Schneier on Security

Subverting Backdoored Encrryption

This is a really interesting research result. This paper proves that two parties can create a secure communications cannel using a communications system with a...

Public Hearing on IoT Risks
From Schneier on Security

Public Hearing on IoT Risks

The US Consumer Product Safety Commission is holding hearings on IoT risks: The U.S. Consumer Product Safety Commission (CPSC, Commission, or we) will conduct a...

Musical Ciphers
From Schneier on Security

Musical Ciphers

Interesting history....

Friday Squid Blogging: Market Squid in Alaskan Waters
From Schneier on Security

Friday Squid Blogging: Market Squid in Alaskan Waters

Rising sea temperatures is causing market squid to move north into Alaskan waters. As usual, you can also use this squid post to talk about the security stories...

Unlocking iPhones with Dead People's Fingerprints
From Schneier on Security

Unlocking iPhones with Dead People's Fingerprints

It's routine for US police to unlock iPhones with the fingerprints of dead people. It seems only to work with recently dead people....

Facebook and Cambridge Analytica
From Schneier on Security

Facebook and Cambridge Analytica

In the wake of the Cambridge Analytica scandal, news articles and commentators have focused on what Facebook knows about us. A lot, it turns out. It collects data...

Another Branch Prediction Attack
From Schneier on Security

Another Branch Prediction Attack

When Spectre and Meltdown were first announced earlier this year, pretty much everyone predicted that there would be many more attacks targeting branch prediction...

Breaking the Anonymity in the Cryptocurrency Monero
From Schneier on Security

Breaking the Anonymity in the Cryptocurrency Monero

Researchers have exploited a flaw in the cryptocurrency Monero to break the anonymity of transactions. Research paper. BoingBoing post....

Tracing Stolen Bitcoin
From Schneier on Security

Tracing Stolen Bitcoin

Ross Anderson has a really interesting paper on tracing stolen bitcoin. From a blog post: Previous attempts to track tainted coins had used either the "poison"...

Fooling Face Recognition with Infrared Light
From Schneier on Security

Fooling Face Recognition with Infrared Light

Yet another development in the arms race between facial recognition systems and facial-recognition-system foolers. BoingBoing post....

Adding Backdoors at the Chip Level
From Schneier on Security

Adding Backdoors at the Chip Level

Interesting research into undetectably adding backdoors into computer chips during manufacture: "Stealthy dopant-level hardware Trojans: extended version," also...

Friday Squid Blogging: Giant Squid Stealing Food from Each Other
From Schneier on Security

Friday Squid Blogging: Giant Squid Stealing Food from Each Other

An interesting hunting strategy: Off of northern Spain, giant squid often feed on schools of fish called blue whiting. The schools swim 400 meters or less below...

Zeynep Tufekci on Facebook and Cambridge Analytica
From Schneier on Security

Zeynep Tufekci on Facebook and Cambridge Analytica

Zeynep Tufekci is particularly cogent about Facebook and Cambridge Analytica. Several news outlets asked me to write about this issue. I didn't, because 1) my book...

GreyKey iPhone Unlocker
From Schneier on Security

GreyKey iPhone Unlocker

Some details about the iPhone unlocker from the US company Greyshift, with photos. Little is known about Grayshift or its sales model at this point. We don't know...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account