acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Apple to Store Encryption Keys in China
From Schneier on Security

Apple to Store Encryption Keys in China

Apple is bowing to pressure from the Chinese government and storing encryption keys in China. While I would prefer it if it would take a stand against China, I...

Cellebrite Unlocks iPhones for the US Government
From Schneier on Security

Cellebrite Unlocks iPhones for the US Government

Forbes reports that the Israeli company Cellebrite can probably unlock all iPhone models: Cellebrite, a Petah Tikva, Israel-based vendor that's become the U.S....

E-Mail Leaves an Evidence Trail
From Schneier on Security

E-Mail Leaves an Evidence Trail

If you're going to commit an illegal act, it's best not to discuss it in e-mail. It's also best to Google tech instructions rather than asking someone else to do...

Friday Squid Blogging: The Symbiotic Relationship Between the Bobtail Squid and a Particular Microbe
From Schneier on Security

Friday Squid Blogging: The Symbiotic Relationship Between the Bobtail Squid and a Particular Microbe

This is the story of the Hawaiian bobtail squid and Vibrio fischeri. As usual, you can also use this squid post to talk about the security stories in the news that...

Election Security
From Schneier on Security

Election Security

I joined a letter supporting the Secure Elections Act (S. 2261): The Secure Elections Act strikes a careful balance between state and federal action to secure American...

Harassment By Package Delivery
From Schneier on Security

Harassment By Package Delivery

People harassing women by delivering anonymous packages purchased from Amazon. On the one hand, there is nothing new here. This could have happened decades ago,...

New Spectre/Meltdown Variants
From Schneier on Security

New Spectre/Meltdown Variants

Researchers have discovered new variants of Spectre and Meltdown. The software mitigations for Spectre and Meltdown seem to block these variants, although the eventual...

Facebook Will Verify the Physical Location of Ad Buyers with Paper Postcards
From Schneier on Security

Facebook Will Verify the Physical Location of Ad Buyers with Paper Postcards

It's not a great solution, but it's something: The process of using postcards containing a specific code will be required for advertising that mentions a specific...

On the Security of Walls
From Schneier on Security

On the Security of Walls

Interesting history of the security of walls: Dún Aonghasa presents early evidence of the same principles of redundant security measures at work in 13th century...

Friday Squid Blogging: Squid Pin
From Schneier on Security

Friday Squid Blogging: Squid Pin

There's a squid pin on Kickstarter. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog...

New National Academies Report on Crypto Policy
From Schneier on Security

New National Academies Report on Crypto Policy

The National Academies has just published "Decrypting the Encryption Debate: A Framework for Decision Makers." It looks really good, although I have not read it...

Election Security
From Schneier on Security

Election Security

Good Washington Post op-ed on the need to use voter-verifiable paper ballots to secure elections, as well as risk-limiting audits....

Can Consumers' Online Data Be Protected?
From Schneier on Security

Can Consumers' Online Data Be Protected?

Everything online is hackable. This is true for Equifax's data and the federal Office of Personal Management's data, which was hacked in 2015. If information is...

Jumping Air Gaps
From Schneier on Security

Jumping Air Gaps

Nice profile of Mordechai Guri, who researches a variety of clever ways to steal data over air-gapped computers. Guri and his fellow Ben-Gurion researchers have...

Internet Security Threats at the Olympics
From Schneier on Security

Internet Security Threats at the Olympics

There are a lot: The cybersecurity company McAfee recently uncovered a cyber operation, dubbed Operation GoldDragon, attacking South Korean organizations related...

Calling Squid "Calamari" Makes It More Appetizing
From Schneier on Security

Calling Squid "Calamari" Makes It More Appetizing

Research shows that what a food is called affects how we think about it. Research paper. As usual, you can also use this squid post to talk about the security stories...

Living in a Smart Home
From Schneier on Security

Living in a Smart Home

In "The House that spied on Me," Kashmir Hill outfits her home to be as "smart" as possible and writes about the results....

Water Utility Infected By Cryptocurrency Mining Software
From Schneier on Security

Water Utility Infected By Cryptocurrency Mining Software

A water utility in Europe has been infected by cryptocurrency mining software. This is a relatively new attack: hackers compromise computers and force them to mine...

Cabinet of Secret Documents from Australia
From Schneier on Security

Cabinet of Secret Documents from Australia

This story of leaked Australian government secrets is unlike any other I've heard: It begins at a second-hand shop in Canberra, where ex-government furniture is...

Poor Security at the Uk National Health Service
From Schneier on Security

Poor Security at the Uk National Health Service

The Guardian is reporting that "every NHS trust assessed for cyber security vulnerabilities has failed to meet the standard required." This is the same NHS that...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account