acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Arguing Against CALEA
From Schneier on Security

Arguing Against CALEA

At a Congressional hearing earlier this week, Matt Blaze made the point that CALEA, the 1994 law that forces telecoms to make phone calls wiretappable, is outdated...

DIRNSA Fired
From Schneier on Security

DIRNSA Fired

In “Secrets and Lies” (2000), I wrote: It is poor civic hygiene to install technologies that could someday facilitate a police state. It’s something a bunch ofnews...

Friday Squid Blogging: Two-Man Giant Squid
From Schneier on Security

Friday Squid Blogging: Two-Man Giant Squid

The Brooklyn indie art-punk group, Two-Man Giant Squid, just released a new album. As usual, you can also use this squid post to talk about the security stories...

Troy Hunt Gets Phished
From Schneier on Security

Troy Hunt Gets Phished

In case you need proof that anyone, even people who do cybersecurity for a living, Troy Hunt has a long, iterative story on his webpage about how he got phished...

Web 3.0 Requires Data Integrity
From Schneier on Security

Web 3.0 Requires Data Integrity

If you’ve ever taken a computer security class, you’ve probably learned about the three legs of computer security—confidentiality, integrity, and availability—known...

Rational Astrologies and Security
From Schneier on Security

Rational Astrologies and Security

John Kelsey and I wrote a short paper for the Rossfest Festschrift: “Rational Astrologies and Security“: There is another non-security way that designers can spend...

Cell Phone OPSEC for Border Crossings
From Schneier on Security

Cell Phone OPSEC for Border Crossings

I have heard stories of more aggressive interrogation of electronic devices at US border crossings. I know a lot about securing computers, but very little about...

The Signal Chat Leak and the NSA
From Schneier on Security

The Signal Chat Leak and the NSA

US National Security Advisor Mike Waltz, who started the now-infamous group chat coordinating a US attack against the Yemen-based Houthis on March 15, is seemingly...

Friday Squid Blogging: Squid Werewolf Hacking Group
From Schneier on Security

Friday Squid Blogging: Squid Werewolf Hacking Group

In another rare squid/cybersecurity intersection, APT37 is also known as “Squid Werewolf.” As usual, you can also use this squid post to talk about the security...

AIs as Trusted Third Parties
From Schneier on Security

AIs as Trusted Third Parties

This is a truly fascinating paper: “Trusted Machine Learning Models Unlock Private Inference for Problems Currently Infeasible with Cryptography.” The basic idea...

A Taxonomy of Adversarial Machine Learning Attacks and Mitigations
From Schneier on Security

A Taxonomy of Adversarial Machine Learning Attacks and Mitigations

NIST just released a comprehensive taxonomy of adversarial machine learning attacks and countermeasures.

AI Data Poisoning
From Schneier on Security

AI Data Poisoning

Cloudflare has a new feature—available to free users as well—that uses AI to generate random pages to feed to AI web crawlers: Instead of simply blocking bots,...

Report on Paragon Spyware
From Schneier on Security

Report on Paragon Spyware

Citizen Lab has a new report on Paragon’s spyware: Key Findings: Introducing Paragon Solutions. Paragon Solutions was founded in Israel in 2019 and sells spyware...

More Countries are Demanding Back-Doors to Encrypted Apps
From Schneier on Security

More Countries are Demanding Back-Doors to Encrypted Apps

Last month I wrote about the UK forcing Apple to break its Advanced Data Protection encryption in iCloud. More recently, both Sweden and France are contemplating...

Friday Squid Blogging: A New Explanation of Squid Camouflage
From Schneier on Security

Friday Squid Blogging: A New Explanation of Squid Camouflage

New research: An associate professor of chemistry and chemical biology at Northeastern University, Deravi’s recently published paper in the Journal of Materials...

My Writings Are in the LibGen AI Training Corpus
From Schneier on Security

My Writings Are in the LibGen AI Training Corpus

The Atlantic has a search tool that allows you to search for specific works in the “LibGen” database of copyrighted works that Meta used to train its AI models....

NCSC Releases Post-Quantum Cryptography Timeline
From Schneier on Security

NCSC Releases Post-Quantum Cryptography Timeline

The UK’s National Computer Security Center (part of GCHQ) released a timeline—also see their blog post—for migration to quantum-computer-resistant cryptography....

Critical GitHub Attack
From Schneier on Security

Critical GitHub Attack

This is serious: A sophisticated cascading supply chain attack has compromised multiple GitHub Actions, exposing critical CI/CD secrets across tens of thousands...

Is Security Human Factors Research Skewed Towards Western Ideas and Habits?
From Schneier on Security

Is Security Human Factors Research Skewed Towards Western Ideas and Habits?

Really interesting research: “How WEIRD is Usable Privacy and Security Research?” by Ayako A. Hasegawa Daisuke Inoue, and Mitsuaki Akiyama: Abstract: In human...

Improvements in Brute Force Attacks
From Schneier on Security

Improvements in Brute Force Attacks

New paper: “GPU Assisted Brute Force Cryptanalysis of GPRS, GSM, RFID, and TETRA: Brute Force Cryptanalysis of KASUMI, SPECK, and TEA3.” Abstract: Key lengths...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account