acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Testing the Usability of PGP Encryption Tools
From Schneier on Security

Testing the Usability of PGP Encryption Tools

"Why Johnny Still, Still Can't Encrypt: Evaluating the Usability of a Modern PGP Client," by Scott Ruoti, Jeff Andersen, Daniel Zappala, and Kent Seamons. Abstract...

Betting Ticket Forged Based on Selfie
From Schneier on Security

Betting Ticket Forged Based on Selfie

This is an interesting story. Someone posts a photograph of herself holding a winning horse-race betting ticket, and someone else uses the data from the photograph...

Bypassing the iPhone Activation Lock
From Schneier on Security

Bypassing the iPhone Activation Lock

Clever man-in-the-middle attack....

Ransomware Is Getting Sophisticated
From Schneier on Security

Ransomware Is Getting Sophisticated

Some of the tricks that ransomware is using to get victims to pay up....

IT Security Is Still a Great Career Path
From Schneier on Security

IT Security Is Still a Great Career Path

Jobs are plentiful and salaries are booming. I know from personal experience that demand far exceeds supply....

Linus Torvalds on Linux Security
From Schneier on Security

Linus Torvalds on Linux Security

Interesting interview. Slashdot thread....

Good Article on the Blockchain
From Schneier on Security

Good Article on the Blockchain

The Economist published a really good article on the blockchain....

Friday Squid Blogging: The Symbiotic Relationship Between Squid and Bacteria
From Schneier on Security

Friday Squid Blogging: The Symbiotic Relationship Between Squid and Bacteria

Margaret McFall-Ngai studies the symbiotic relationship between squid and the bacteria that live inside them. As usual, you can also use this squid post to talk...

Passwords by Mail
From Schneier on Security

Passwords by Mail

Julia Angwin's daughter is selling diceware passwords by mail....

The Effects of Surveillance on the Victims
From Schneier on Security

The Effects of Surveillance on the Victims

Last month, the Cato Institute held its Second Annual Cato Surveillance Conference. It was an excellent event, with many interesting talks and panels. But their...

Analyzing Reshipping Mule Scams
From Schneier on Security

Analyzing Reshipping Mule Scams

Interesting paper: "Drops for Stuff: An Analysis of Reshipping Mule Scams. From a blog post: A cybercriminal (called operator) recruits unsuspecting citizens with...

$1M Bounty for iPhone Hack
From Schneier on Security

$1M Bounty for iPhone Hack

I don't know whether to believe this story. Supposedly the startup Zerodium paid someone $1M for an iOS 9.1 and 9.2b hack. Bekrar and Zerodium, as well as its predecessor...

Australia Is Testing Virtual Passports
From Schneier on Security

Australia Is Testing Virtual Passports

Australia is going to be the first country to have virtual passports. Presumably, the passport data will be in the cloud somewhere, and you'll access it with an...

The Rise of Political Doxing
From Schneier on Security

The Rise of Political Doxing

Last week, CIA director John O. Brennan became the latest victim of what's become a popular way to embarrass and harass people on the Internet. A hacker allegedly...

Friday Squid Blogging: Baby Giant Squid Found
From Schneier on Security

Friday Squid Blogging: Baby Giant Squid Found

First ever examples of a baby giant squid have been found. As usual, you can also use this squid post to talk about the security stories in the news that I haven't...

The Onion on the State of IT Security
From Schneier on Security

The Onion on the State of IT Security

"China Unable To Recruit Hackers Fast Enough To Keep Up With Vulnerabilities In U.S. Security Systems." It's only funny because it's true....

Weaknesses in the PLAID Protocol
From Schneier on Security

Weaknesses in the PLAID Protocol

In 2009, the Australian government released the Protocol for Lightweight Authentication of Identity (PLAID) protocol. It was recently analyzed (original paper is...

Flash Drive Lock
From Schneier on Security

Flash Drive Lock

This device is clever: it's a three-digit combination lock that prevents a USB drive from being read. It's not going to keep out anyone serious, but is a great...

Tracking Connected Vehicles
From Schneier on Security

Tracking Connected Vehicles

Researchers have shown that it is both easy and cheap to surveil connected vehicles. The second link talks about various anonymization techniques, none of which...

Why Is the NSA Moving Away from Elliptic Curve Cryptography?
From Schneier on Security

Why Is the NSA Moving Away from Elliptic Curve Cryptography?

In August, I wrote about the NSA's plans to move to quantum-resistant algorithms for its own cryptographic needs. Cryptographers Neal Koblitz and Alfred Menezes...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account