acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Security Vulnerabilities in Certificate Pinning
From Schneier on Security

Security Vulnerabilities in Certificate Pinning

New research found that many banks offer certificate pinning as a security feature, but fail to authenticate the hostname. This leaves the systems open to man-in...

Germany Preparing Backdoor Law
From Schneier on Security

Germany Preparing Backdoor Law

The German Interior Minister is preparing a bill that allows the government to mandate backdoors in encryption. No details about how likely this is to pass. I am...

Matt Blaze on Securing Voting Machines
From Schneier on Security

Matt Blaze on Securing Voting Machines

Matt Blaze's House testimony on the security of voting machines is an excellent read. (Details on the entire hearing is here.) I have not watched the video....

"Crypto" Is Being Redefined as Cryptocurrencies
From Schneier on Security

"Crypto" Is Being Redefined as Cryptocurrencies

I agree with Lorenzo Franceschi-Bicchierai, "Cryptocurrencies aren't 'crypto'": Lately on the internet, people in the world of Bitcoin and other digital currencies...

Friday Squid Blogging: Research into Squid-Eating Beaked Whales
From Schneier on Security

Friday Squid Blogging: Research into Squid-Eating Beaked Whales

Beaked whales, living off the coasts of Ireland, feed on squid. As usual, you can also use this squid post to talk about the security stories in the news that I...

Needless Panic Over a Wi-FI Network Name
From Schneier on Security

Needless Panic Over a Wi-FI Network Name

A Turkish Airlines flight made an emergency landing because someone named his wireless network (presumably from his smartphone) "bomb on board." In 2006, I wrote...

NSA "Red Disk" Data Leak
From Schneier on Security

NSA "Red Disk" Data Leak

ZDNet is reporting about another data leak, this one from US Army's Intelligence and Security Command (INSCOM), which is also within to the NSA. The disk image,...

Warrant Protections against Police Searches of Our Data
From Schneier on Security

Warrant Protections against Police Searches of Our Data

The cell phones we carry with us constantly are the most perfect surveillance device ever invented, and our laws haven't caught up to that reality. That might change...

Man-in-the-Middle Attack against Electronic Car-Door Openers
From Schneier on Security

Man-in-the-Middle Attack against Electronic Car-Door Openers

This is an interesting tactic, and there's a video of it being used: The theft took just one minute and the Mercedes car, stolen from the Elmdon area of Solihull...

Uber Data Hack
From Schneier on Security

Uber Data Hack

Uber was hacked, losing data on 57 million driver and rider accounts. The company kept it quiet for over a year. The details are particularly damning: The two hackers...

Friday Squid Blogging: Fake Squid Seized in Cambodia
From Schneier on Security

Friday Squid Blogging: Fake Squid Seized in Cambodia

Falsely labeled squid snacks were seized in Cambodia. I don't know what food product it really was. As usual, you can also use this squid post to talk about the...

Mozilla's Guide to Privacy-Aware Christmas Shopping
From Schneier on Security

Mozilla's Guide to Privacy-Aware Christmas Shopping

Mozilla reviews the privacy practices of Internet-connected toys, home accessories, exercise equipment, and more....

Websites Use Session-Replay Scripts to Eavesdrop on Every Keystroke and Mouse Movement
From Schneier on Security

Websites Use Session-Replay Scripts to Eavesdrop on Every Keystroke and Mouse Movement

The security researchers at Princeton are posting You may know that most websites have third-party analytics scripts that record which pages you visit and the searches...

Amazon Creates Classified US Cloud
From Schneier on Security

Amazon Creates Classified US Cloud

Amazon has a cloud for U.S. classified data. The physical and computer requirements for handling classified information are considerable, both in terms of technology...

Vulnerability in Amazon Key
From Schneier on Security

Vulnerability in Amazon Key

Amazon Key is an IoT door lock that can enable one-time access codes for delivery people. To further secure that system, Amazon sells Cloud Cam, a camera that watches...

Friday Squid Blogging: Peru and Chile Address Squid Overfishing
From Schneier on Security

Friday Squid Blogging: Peru and Chile Address Squid Overfishing

Peru and Chile have a new plan. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting...

New White House Announcement on the Vulnerability Equities Process
From Schneier on Security

New White House Announcement on the Vulnerability Equities Process

The White House has released a new version of the Vulnerabilities Equities Process (VEP). This is the inter-agency process by which the US government decides whether...

Motherboard Digital Security Guide
From Schneier on Security

Motherboard Digital Security Guide

This digital security guide by Motherboard is very good. I put alongside EFF's "Surveillance Self-Defense" and John Scott-Railton's "Digital Security Low Hanging...

Apple FaceID Hacked
From Schneier on Security

Apple FaceID Hacked

It only took a week: On Friday, Vietnamese security firm Bkav released a blog post and video showing that -- by all appearances -- they'd cracked FaceID with a...

Long Article on NSA and the Shadow Brokers
From Schneier on Security

Long Article on NSA and the Shadow Brokers

The New York Times just published a long article on the Shadow Brokers and their effects on NSA operations. Summary: it's been an operational disaster, the NSA...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account