acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Anonymous Browsing at the Library
From Schneier on Security

Anonymous Browsing at the Library

A rural New Hampshire library decided to install Tor on their computers and allow anonymous Internet browsing. The Department of Homeland pressured them to stop...

Child Arrested Because Adults Are Stupid
From Schneier on Security

Child Arrested Because Adults Are Stupid

A Texas 9th-grader makes an electronic clock and brings it to school. Teachers immediately become stupid and call the police: The bell rang at least twice, he said...

Obama and the Security of the Waldorf Astoria Hotel
From Schneier on Security

Obama and the Security of the Waldorf Astoria Hotel

President Obama won't stay at the Waldorf Astoria Hotel in New York because of security concerns. The hotel "was bought last year by Chinese investors with deep...

Hacking Team, Computer Vulnerabilities, and the NSA
From Schneier on Security

Hacking Team, Computer Vulnerabilities, and the NSA

When the National Security Administration (NSA) -- or any government agency -- discovers a vulnerability in a popular computer system, should it disclose it or...

Security Cartoon
From Schneier on Security

Security Cartoon

"Security vs. privacy."...

Programming Errors Weaken bcrypt Hashes of Ashley Madison Passwords
From Schneier on Security

Programming Errors Weaken bcrypt Hashes of Ashley Madison Passwords

Ashley Madison encrypted users' passwords using the bcrypt function. It's a secure password-encryption function, but two implemention programming mistakes allows...

Friday Squid Blogging: The Chemistry of Squid Camouflage
From Schneier on Security

Friday Squid Blogging: The Chemistry of Squid Camouflage

Interesting research. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Wanted: Cryptography Products for Worldwide Survey
From Schneier on Security

Wanted: Cryptography Products for Worldwide Survey

In 1999, Lance Hoffman, David Balenson, and others published a survey of non-US cryptographic products. The point of the survey was to illustrate that there was...

Drone Self-Defense and the Law
From Schneier on Security

Drone Self-Defense and the Law

Last month, a Kentucky man shot down a drone that was hovering near his backyard. WDRB News reported that the camera drone's owners soon showed up at the home of...

Cheating News from the Chess World
From Schneier on Security

Cheating News from the Chess World

Chess player caught cheating at a tournament: I kept on looking at him. He was always sitting down, he never got up. It was very strange; we are taking about hours...

FBI and Apple's Encryption
From Schneier on Security

FBI and Apple's Encryption

The New York Times is reporting that Apple encryption is hampering an FBI investigation: In an investigation involving guns and drugs, the Justice Department obtained...

Animals vs. Drones
From Schneier on Security

Animals vs. Drones

It's not just humans who dislike the small flying objects. YouTube has videos of drones being stared at quizzically by a moose, harassed by a raven, attacked by...

The Security Risks of Third-party Data
From Schneier on Security

The Security Risks of Third-party Data

Most of us get to be thoroughly relieved that our emails weren't in the Ashley Madison database. But don't get too comfortable. Whatever secrets you have, even...

TSA Master Keys
From Schneier on Security

TSA Master Keys

Someone recently noticed a Washington Post story on the TSA that originally contained a detailed photograph of all the TSA master keys. It's now blurred out of...

Glenn Greenwald Debates Keith Alexander
From Schneier on Security

Glenn Greenwald Debates Keith Alexander

Interesting debate, surprisingly civil. Alexander seemed to have been okay with Snowden revealing surveillance based on Section 215: "If he had taken the one court...

Understanding Squid Self-Healing Teeth
From Schneier on Security

Understanding Squid Self-Healing Teeth

Using squid teeth as a model, researchers have created "the first material that heals itself in water." Paper from Nature. As usual, you can also use this squid...

I'll be Talking Cyber-Resilience on a Webinar
From Schneier on Security

I'll be Talking Cyber-Resilience on a Webinar

This coming Thursday, I'll be talking with Larry Poneman about cyber-resilience and the results of a new survey he's releasing. Join us here. The event is sponsored...

China's "Great Cannon"
From Schneier on Security

China's "Great Cannon"

Interesting research: "An Analysis of China's 'Great Cannon.'" Abstract: On March 16th, 2015, the Chinese censorship apparatus employed a new tool, the "Great Cannon"...

"The Declining Half-Life of Secrets"
From Schneier on Security

"The Declining Half-Life of Secrets"

Several times I've mentioned Peter Swire's concept of "the declining half-life of secrets." He's finally written it up: The nature of secrets is changing. Secrets...

History of the L0pht
From Schneier on Security

History of the L0pht

This Washington Post article uses the history of the L0pht to talk about the broader issues of Internet security....
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account