acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

The Internet of Things that Talks About You Behind Your Back
From Schneier on Security

The Internet of Things that Talks About You Behind Your Back

SilverPush is an Indian startup that's trying to figure out all the different computing devices you own. It embeds inaudible sounds into the webpages you read and...

Michael Hayden and the Dutch Government Are against Crypto Backdoors
From Schneier on Security

Michael Hayden and the Dutch Government Are against Crypto Backdoors

Last week, former NSA Director Michael Hayden made a very strong argument against deliberately weakening security products by adding backdoors: Americans' safety...

Mac OS X, iOS, and Flash Had the Most Discovered Vulnerabilities in 2015
From Schneier on Security

Mac OS X, iOS, and Flash Had the Most Discovered Vulnerabilities in 2015

Interesting analysis: Which software had the most publicly disclosed vulnerabilities this year? The winner is none other than Apple's Mac OS X, with 384 vulnerabilities...

IT Security and the Normalization of Deviance
From Schneier on Security

IT Security and the Normalization of Deviance

Professional pilot Ron Rapp has written a fascinating article on a 2014 Gulfstream plane that crashed on takeoff. The accident was 100% human error and entirely...

Friday Squid Blogging: Squid Ink Pasta
From Schneier on Security

Friday Squid Blogging: Squid Ink Pasta

Squid ink pasta is not hard to make, and is a really good side for a wide variety of fish recipes. As usual, you can also use this squid post to talk about the...

Podcast Interview with Me
From Schneier on Security

Podcast Interview with Me

The Technoskeptic has posted a good interview with me on its website. Normally it charges for its content, but this interview is available for free....

"How Stories Deceive"
From Schneier on Security

"How Stories Deceive"

Fascinating New Yorker article about Samantha Azzopardi, serial con artist and deceiver. The article is really about how our brains allow stories to deceive us:...

Replacing Judgment with Algorithms
From Schneier on Security

Replacing Judgment with Algorithms

China is considering a new "social credit" system, designed to rate everyone's trustworthiness. Many fear that it will become a tool of social control -- but in...

Straight Talk about Terrorism
From Schneier on Security

Straight Talk about Terrorism

Nice essay that lists ten "truths" about terrorism: We can't keep the bad guys out. Besides, the threat is already inside. More surveillance won't get rid of terrorism...

How the US Is Playing Both Ends on Data Privacy
From Schneier on Security

How the US Is Playing Both Ends on Data Privacy

There's an excellent article in Foreign Affairs on how the European insistence on data privacy -- most recently illustrated by their invalidation of the "safe harbor"...

1981 CIA Report on Deception
From Schneier on Security

1981 CIA Report on Deception

Recently declassified: Deception Maxims: Fact and Folklore, Office of Research and Development, Central Intelligence Agency, June 1981. Research on deception and...

NSA Spies on Israeli Prime Minister
From Schneier on Security

NSA Spies on Israeli Prime Minister

The Wall Street Journal has a story that the NSA spied on Israeli Prime Minister Benjamin Netanyahu and other Israeli government officials, and incidentally collected...

Windows 10 Whole-Disk Encryption without Key Escrow
From Schneier on Security

Windows 10 Whole-Disk Encryption without Key Escrow

On the Intercept, Micah Lee has a good article that talks about how Microsoft is collecting the hard-drive encryption keys of Windows 10 users, and how to disable...

De-Anonymizing Users from their Coding Styles
From Schneier on Security

De-Anonymizing Users from their Coding Styles

Interesting blog post: We are able to de-anonymize executable binaries of 20 programmers with 96% correct classification accuracy. In the de-anonymization process...

Friday Squid Blogging: Video of Live Giant Squid
From Schneier on Security

Friday Squid Blogging: Video of Live Giant Squid

Giant squid filmed swimming through a harbor in Japan: Reports in Japanese say that the creature was filmed on December 24, seen by an underwater camera swimming...

Cory Doctorow on Software Security and the Internet of Things
From Schneier on Security

Cory Doctorow on Software Security and the Internet of Things

Cory Doctorow has a good essay on software integrity and control problems and the Internet of Things. He's writing about self-driving cars, but the issue is much...

Another Scandal Resulting from E-mails Gone Public
From Schneier on Security

Another Scandal Resulting from E-mails Gone Public

A lot of Pennsylvania government officials are being hurt as a result of e-mails being made public. This is all the result of a political pressure to release the...

PayPal Authentication Still Substandard
From Schneier on Security

PayPal Authentication Still Substandard

Brian Krebs has the story. Bottom line: PayPal has no excuse for this kind of stuff. I hope the public shaming incents them to offer better authentication for its...

DMCA and the Internet of Things
From Schneier on Security

DMCA and the Internet of Things

In theory, the Internet of Things -- the connected network of tiny computers inside home appliances, household objects, even clothing -- promises to make your life...

NSA/GCHQ Exploits Against Juniper Networking Equipment
From Schneier on Security

NSA/GCHQ Exploits Against Juniper Networking Equipment

The Intercept just published a 2011 GCHQ document outlining their exploit capabilities against Juniper networking equipment, including routers and NetScreen firewalls...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account