acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Girl Scouts to Offer Merit Badges in Cybersecurity
From Schneier on Security

Girl Scouts to Offer Merit Badges in Cybersecurity

The Girl Scouts are going to be offering 18 merit badges in cybersecurity, to scouts as young as five years old....

CIA Exploits Against Wireless Routers
From Schneier on Security

CIA Exploits Against Wireless Routers

WikiLeaks has published CherryBlossom, the CIA's program to hack into wireless routers. The program is about a decade old. Four good news articles. Five. And a...

Article on the DAO Ethereum Hack
From Schneier on Security

Article on the DAO Ethereum Hack

This is good....

Fighting Leakers at Apple
From Schneier on Security

Fighting Leakers at Apple

Apple is fighting its own battle against leakers, using people and tactics from the NSA. According to the hour-long presentation, Apple's Global Security team employs...

Separating the Paranoid from the Hacked
From Schneier on Security

Separating the Paranoid from the Hacked

Sad story of someone whose computer became owned by a griefer: The trouble began last year when he noticed strange things happening: files went missing from his...

The FAA Is Arguing for Security by Obscurity
From Schneier on Security

The FAA Is Arguing for Security by Obscurity

In a proposed rule by the FAA, it argues that software in an Embraer S.A. Model ERJ 190-300 airplane is secure because it's proprietary: In addition, the operating...

Friday Squid Blogging: Injured Giant Squid Video
From Schneier on Security

Friday Squid Blogging: Injured Giant Squid Video

A paddleboarder had a run-in with an injured giant squid. Video. Here's the real story. As usual, you can also use this squid post to talk about the security stories...

The Secret Code of Beatrix Potter
From Schneier on Security

The Secret Code of Beatrix Potter

Interesting: As codes go, Potter's wasn't inordinately complicated. As Wiltshire explains, it was a "mono-alphabetic substitution cipher code," in which each letter...

Amazon Patents Measures to Prevent In-Store Comparison Shopping
From Schneier on Security

Amazon Patents Measures to Prevent In-Store Comparison Shopping

Amazon has been issued a patent on security measures that prevents people from comparison shopping while in the store. It's not a particularly sophisticated patent...

NSA Insider Security Post-Snowden
From Schneier on Security

NSA Insider Security Post-Snowden

According to a recently declassified report obtained under FOIA, the NSA's attempts to protect itself against insider attacks aren't going very well: The N.S.A....

Is Continuing to Patch Windows XP a Mistake?
From Schneier on Security

Is Continuing to Patch Windows XP a Mistake?

Last week, Microsoft issued a security patch for Windows XP, a 16-year-old operating system that Microsoft officially no longer supports. Last month, Microsoft...

The Dangers of Secret Law
From Schneier on Security

The Dangers of Secret Law

Last week, the Department of Justice released 18 new FISC opinions related to Section 702 as part of an EFF FOIA lawsuit. (Of course, they don't mention EFF or...

Ceramic Knife Used in Israel Stabbing
From Schneier on Security

Ceramic Knife Used in Israel Stabbing

I have no comment on the politics of this stabbing attack, and only note that the attacker used a ceramic knife -- that will go through metal detectors. I have...

New Technique to Hijack Social Media Accounts
From Schneier on Security

New Technique to Hijack Social Media Accounts

Access Now has documented it being used against a Twitter user, but it also works against other social media accounts: With the Doubleswitch attack, a hijacker...

Friday Squid Blogging: Squids from Space Video Game
From Schneier on Security

Friday Squid Blogging: Squids from Space Video Game

An early preview. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines...

NSA Links WannaCry to North Korea
From Schneier on Security

NSA Links WannaCry to North Korea

There's evidence: Though the assessment is not conclusive, the preponderance of the evidence points to Pyongyang. It includes the range of computer Internet protocol...

Gaming Google News
From Schneier on Security

Gaming Google News

Turns out that it's surprisingly easy to game: It appears that news sites deemed legitimate by Google News are being modified by third parties. These sites are...

Millennials and Secret Leaking
From Schneier on Security

Millennials and Secret Leaking

I hesitate to blog this, because it's an example of everything that's wrong with pop psychology. Malcolm Harris writes about millennials, and has a theory of why...

Data vs. Analysis in Counterterrorism
From Schneier on Security

Data vs. Analysis in Counterterrorism

This article argues that Britain's counterterrorism problem isn't lack of data, it's lack of analysis....

The grugq on Reality Winner, the Intercept, and OPSEC
From Schneier on Security

The grugq on Reality Winner, the Intercept, and OPSEC

Good commentary....
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account