acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Apple Copies Your Files Without Your Knowledge or Consent
From Schneier on Security

Apple Copies Your Files Without Your Knowledge or Consent

The latest version of Apple's OS automatically syncs your files to iCloud Drive, even files you choose to store locally. Apple encrypts your data, both in transit...

US Intelligence "Second Leaker" Identified
From Schneier on Security

US Intelligence "Second Leaker" Identified

There's a report that the FBI has identified a second leaker: The case in question involves an Aug. 5 story published by The Intercept, an investigative website...

Authentication Attack Against Credit Card Verification
From Schneier on Security

Authentication Attack Against Credit Card Verification

Here's a physical attack against a credit card verification system. Basically, the attack disrupts the communications between the retail terminal and the system...

Spritz: A New RC4-Like Stream Cipher
From Schneier on Security

Spritz: A New RC4-Like Stream Cipher

Last week, Ron Rivest gave a talk at MIT about Spritz, a new stream cipher by him and Jacob Schuldt. It's basically a redesign of RC4, given current cryptographic...

Friday Squid Blogging: Humboldt Squids Attack Submarine
From Schneier on Security

Friday Squid Blogging: Humboldt Squids Attack Submarine

A pair of Humboldt squids attacked a Greenpeace submarine. There's video. As usual, you can also use this squid post to talk about the security stories in the news...

The Ineffectiveness of Sealing the Border Against Ebola (and Other Viruses)
From Schneier on Security

The Ineffectiveness of Sealing the Border Against Ebola (and Other Viruses)

Good analysis....

Analysis of Printer Watermarking Techniques
From Schneier on Security

Analysis of Printer Watermarking Techniques

Interesting paper: Maya Embar, Louis M. McHough IV, and William R. Wesselman, "Printer watermark obfuscation," Proceeding RIIT '14: Proceedings of the 3rd annual...

The NSA's Role in Commercial Cybersecurity
From Schneier on Security

The NSA's Role in Commercial Cybersecurity

Susan Landau has a new paper on the NSA's increasing role in commercial cybersecurity. She argues that the NSA is the wrong organization to do this, and we need...

Jumping Air Gaps with All-in-One Printers
From Schneier on Security

Jumping Air Gaps with All-in-One Printers

Last week, Adi Shamir gave a presentation at Black Hat Europe on using all-in-one printers to control computers on the other side of air gaps. There's no paper...

Deanonymizing Taxi Passenger and Fare Data
From Schneier on Security

Deanonymizing Taxi Passenger and Fare Data

Interesting essay on the sorts of things you can learn from anonymized taxi passenger and fare data....

Whisper Tracks Users
From Schneier on Security

Whisper Tracks Users

The Guardian has reported that the app Whisper tracks users, and then published a second article explaining what it knows after Whisper denied the story. Here's...

More Crypto Wars II
From Schneier on Security

More Crypto Wars II

FBI Director James Comey again called for an end to secure encryption by putting in a backdoor. Here's his speech: There is a misconception that building a lawful...

How Did the Feds Identity Dread Pirate Roberts?
From Schneier on Security

How Did the Feds Identity Dread Pirate Roberts?

Last month, I wrote that the FBI identified Ross W. Ulbricht as the Silk Road's Dread Pirate Roberts through a leaky CAPTCHA. Seems that story doesn't hold water...

Friday Squid Blogging: 1,057 Squid T-Shirts
From Schneier on Security

Friday Squid Blogging: 1,057 Squid T-Shirts

That's a lot. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. And commenting was broken for a...

Hacking a Video Poker Machine
From Schneier on Security

Hacking a Video Poker Machine

Kevin Poulsen has written an interesting story about two people who successfully exploited a bug in a popular video poker machine....

NSA Classification ECI = Exceptionally Controlled Information
From Schneier on Security

NSA Classification ECI = Exceptionally Controlled Information

ECI is a classification above Top Secret. It's for things that are so sensitive they're basically not written down, like the names of companies whose cryptography...

DEA Sets Up Fake Facebook Page in Woman's Name
From Schneier on Security

DEA Sets Up Fake Facebook Page in Woman's Name

This is a creepy story. A woman has her phone seized by the Drug Enforcement Agency and gives them permission to look at her phone. Without her knowledge or consent...

FOXACID Operations Manual
From Schneier on Security

FOXACID Operations Manual

A few days ago, I saw this tweet: "Just a reminder that it is now *a full year* since Schneier cited it, and the FOXACID ops manual remains unpublished." It's true...

Surveillance in Schools
From Schneier on Security

Surveillance in Schools

This essay, "Grooming students for a lifetime of surveillance," talks about the general trends in student surveillance. Related: essay on the need for student privacy...

How James Bamford Came to Write The Puzzle Palace
From Schneier on Security

How James Bamford Came to Write The Puzzle Palace

Interesting essay about James Bamford and his efforts to publish The Puzzle Palace over the NSA's objections. Required reading for those who think the NSA's excesses...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account