acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorschneier
bg-corner

GoGo Wireless Adds Surveillance Capabilities for Government
From Schneier on Security

GoGo Wireless Adds Surveillance Capabilities for Government

The important piece of this story is not that GoGo complies with the law, but that it goes above and beyond what is required by law. It has voluntarily decided...

Friday Squid Blogging: Bronze Giant Squid Sculpture
From Schneier on Security

Friday Squid Blogging: Bronze Giant Squid Sculpture

A little too big for my house....

More on Heartbleed
From Schneier on Security

More on Heartbleed

This is an update to my earlier post. Cloudflare is reporting that its very difficult, if not practically impossible, to steal SSL private keys with this attack...

Police Disabling Their own Voice Recorders
From Schneier on Security

Police Disabling Their own Voice Recorders

This is not a surprise: The Los Angeles Police Commission is investigating how half of the recording antennas in the Southeast Division went missing, seemingly...

Heartbleed
From Schneier on Security

Heartbleed

Heartbleed is a catastrophic bug in OpenSSL: "The Heartbleed bug allows anyone on the Internet to read the memory of the systems protected by the vulnerable versions...

"Unbreakable" Encryption Almost Certainly Isn't
From Schneier on Security

"Unbreakable" Encryption Almost Certainly Isn't

This headline is provocative: "Human biology inspires 'unbreakable' encryption." The article is similarly nonsensical: Researchers at Lancaster University, UK have...

The Youngest Security Researcher
From Schneier on Security

The Youngest Security Researcher

Five-year-old finds login vulnerability in Microsoft Xbox....

Friday Squid Blogging: Squid + Security in a Cartoon
From Schneier on Security

Friday Squid Blogging: Squid + Security in a Cartoon

Funny....

Mass Surveillance by Eavesdropping on Web Cookies
From Schneier on Security

Mass Surveillance by Eavesdropping on Web Cookies

Interesting research: Abstract: We investigate the ability of a passive network observer to leverage third-party HTTP tracking cookies for mass surveillance. If...

Ephemeral Apps
From Schneier on Security

Ephemeral Apps

Ephemeral messaging apps such as Snapchat, Wickr and Frankly, all of which advertise that your photo, message or update will only be accessible for a short period...

Seventh Movie-Plot Threat Contest
From Schneier on Security

Seventh Movie-Plot Threat Contest

As you might expect, this year's contest has the NSA as the villain: The NSA has won, but how did it do it? How did it use its ability to conduct ubiquitous surveillance...

The Continuing Public/Private Surveillance Partnership
From Schneier on Security

The Continuing Public/Private Surveillance Partnership

If you've been reading the news recently, you might think that corporate America is doing its best to thwart NSA surveillance. Google just announced that it is...

Friday Squid Blogging: Encounter Between a Submersible Robot and a Giant Squid
From Schneier on Security

Friday Squid Blogging: Encounter Between a Submersible Robot and a Giant Squid

Wow....

Creating Forensic Sketches from DNA
From Schneier on Security

Creating Forensic Sketches from DNA

This seems really science fictional: It's already possible to make some inferences about the appearance of crime suspects from their DNA alone, including their...

NSA Hacks Huawei
From Schneier on Security

NSA Hacks Huawei

Both Der Spiegel and the New York Times are reporting that the NSA has hacked Huawei pretty extensively, getting copies of the company's products' source code and...

Password Hashing Competition
From Schneier on Security

Password Hashing Competition

There's a private competition to identify new password hashing schemes. Submissions are due at the end of the month....

Smarter People are More Trusting
From Schneier on Security

Smarter People are More Trusting

Interesting research. Both vocabulary and question comprehension were positively correlated with generalized trust. Those with the highest vocab scores were 34...

Giant Squid as an Omen
From Schneier on Security

Giant Squid as an Omen

An omen of what? An increase in the number of giant squid being caught along the Sea of Japan coast is leading puzzled fishermen to fear their presence may be some...

Geolocating Twitter Users
From Schneier on Security

Geolocating Twitter Users

Interesting research into figuring out where Twitter users are located, based on similar tweets from other users: While geotags are the most definitive location...

Chilean Drug Trafficker Pencil-and-Paper Code
From Schneier on Security

Chilean Drug Trafficker Pencil-and-Paper Code

Interesting....
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account