acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorschneier
bg-corner

Another Side-Channel Attack on PC Encryption
From Schneier on Security

Another Side-Channel Attack on PC Encryption

New paper: "Physical Key Extraction Attacks on PCs," by Daniel Genkin, Lev Pachmanov, Itamar Pipman, Adi Shamir, and Eran Tromer. They recover keys acoustically...

Hijacking the PC Update Process
From Schneier on Security

Hijacking the PC Update Process

There's a new report on security vulnerabilities in the PC initialization/update process, allowing someone to hijack it to install malware: One of the major things...

Friday Squid Blogging: Giant Mechanical Squid
From Schneier on Security

Friday Squid Blogging: Giant Mechanical Squid

It's beautiful, from the Maker Faire Bay Area 2016....

Security and Human Behavior (SHB 2016)
From Schneier on Security

Security and Human Behavior (SHB 2016)

Earlier this week, I was at the ninth Workshop on Security and Human Behavior, hosted at Harvard University. SHB is a small invitational gathering of people studying...

Stuxnet-Like Malware Discovered
From Schneier on Security

Stuxnet-Like Malware Discovered

There's a new piece of malware called Irongate, which is obviously inspired by Stuxnet. We don't know who is responsible for it. Slashdot thread....

Lockpicking Competitions in the 1950s
From Schneier on Security

Lockpicking Competitions in the 1950s

Interesting history....

Stealth Falcon: New Malware from (Probably) the UAE
From Schneier on Security

Stealth Falcon: New Malware from (Probably) the UAE

Citizen Lab has the details: This report describes a campaign of targeted spyware attacks carried out by a sophisticated operator, which we call Stealth Falcon....

The Fallibility of DNA Evidence
From Schneier on Security

The Fallibility of DNA Evidence

This is a good summary article on the fallibility of DNA evidence. Most interesting to me are the parts on the proprietary algorithms used in DNA matching: William...

Arresting People for Walking Away from Airport Security
From Schneier on Security

Arresting People for Walking Away from Airport Security

A proposed law in Albany, NY, would make it a crime to walk away from airport screening. Aside from wondering why county lawmakers are getting involved with what...

Identifying People from their Driving Patterns
From Schneier on Security

Identifying People from their Driving Patterns

People can be identified from their "driver fingerprint": ...a group of researchers from the University of Washington and the University of California at San Diego...

Friday Squid Blogging: More Squids
From Schneier on Security

Friday Squid Blogging: More Squids

This research paper shows that the number of squids, and the number of cephalopods in general, has been steadily increasing over the past 60 years: Our analyses...

Skein in FreeBSD
From Schneier on Security

Skein in FreeBSD

The Skein hash function is now part of FreeBSD....

The Unfalsifiability of Security Claims
From Schneier on Security

The Unfalsifiability of Security Claims

Interesting research paper: Cormac Herley, "Unfalsifiability of security claims: There is an inherent asymmetry in computer security: things can be declared insecure...

Suckfly
From Schneier on Security

Suckfly

Suckfly seems to be another Chinese nation-state espionage tool, first stealing South Korean certificates and now attacking Indian networks. Symantec has done a...

Companies Not Saving Your Data
From Schneier on Security

Companies Not Saving Your Data

There's a new trend in Silicon Valley startups; companies are not collecting and saving data on their customers: In Silicon Valley, there's a new emphasis on putting...

Should You Be Allowed to Prevent Drones from Flying Over Your Property?
From Schneier on Security

Should You Be Allowed to Prevent Drones from Flying Over Your Property?

Good debate in the Wall Street Journal. This isn't an obvious one; there are good arguments on both sides....

GCHQ Discloses Two OS X Vulnerabilities to Apple
From Schneier on Security

GCHQ Discloses Two OS X Vulnerabilities to Apple

This is good news: Communications and Electronics Security Group (CESG), the information security arm of GCHQ, was credited with the discovery of two vulnerabilities...

Google Moving Forward on Automatic Logins
From Schneier on Security

Google Moving Forward on Automatic Logins

Google is trying to bring this to Android developers by the end of the year: Today, secure logins -- like those used by banks or in the enterprise environment -...

State of Online Tracking
From Schneier on Security

State of Online Tracking

Really interesting research: "Online tracking: A 1-million-site measurement and analysis," by Steven Englehardt and Arvind Narayanan: Abstract: We present the largest...

Friday Squid Blogging: Squid Kite
From Schneier on Security

Friday Squid Blogging: Squid Kite

Video. Plus an octopus kite, with another squid kite in the background. As usual, you can also use this squid post to talk about the security stories in the news...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account