acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Splitting the NSA and US Cyber Command
From Schneier on Security

Splitting the NSA and US Cyber Command

Rumor is that the Trump administration will separate the NSA and US Cyber Command. I have long thought this was a good idea. Here's a good discussion of what it...

Voting Machine Security
From Schneier on Security

Voting Machine Security

Last week, DefCon hosted a "Voter Hacker Village" event. Every single voting machine there was easily hackable. Here are detailed details. There should be a summary...

Detecting Stingrays
From Schneier on Security

Detecting Stingrays

Researchers are developing technologies that can detect IMSI-catchers: those fake cell phone towers that can be used to surveil people in the area. This is good...

NSA Collects MS Windows Error Information
From Schneier on Security

NSA Collects MS Windows Error Information

Back in 2013, Der Spiegel reported that the NSA intercepts and collects Windows bug reports: One example of the sheer creativity with which the TAO spies approach...

Vulnerabilities in Car Washes
From Schneier on Security

Vulnerabilities in Car Washes

Articles about serious vulnerabilities in IoT devices and embedded systems are now dime-a-dozen. This one concerns Internet-connected car washes: A group of security...

Robot Safecracking
From Schneier on Security

Robot Safecracking

Robots can crack safes faster than humans -- and differently: So Seidle started looking for shortcuts. First he found that, like many safes, his SentrySafe had...

Measuring Vulnerability Rediscovery
From Schneier on Security

Measuring Vulnerability Rediscovery

New paper: "Taking Stock: Estimating Vulnerability Rediscovery," by Trey Herr, Bruce Schneier, and Christopher Morris: Abstract: How often do multiple, independent...

Friday Squid Blogging: Giant Squids Have Small Brains
From Schneier on Security

Friday Squid Blogging: Giant Squids Have Small Brains

New research: In this study, the optic lobe of a giant squid (Architeuthis dux, male, mantle length 89 cm), which was caught by local fishermen off the northeastern...

Me on Restaurant Surveillance Technology
From Schneier on Security

Me on Restaurant Surveillance Technology

I attended the National Restaurant Association exposition in Chicago earlier this year, and looked at all the ways modern restaurant IT is spying on people. But...

Zero-Day Vulnerabilities against Windows in the NSA Tools Released by the Shadow Brokers
From Schneier on Security

Zero-Day Vulnerabilities against Windows in the NSA Tools Released by the Shadow Brokers

In April, the Shadow Brokers -- presumably Russia -- released a batch of Windows exploits from what is presumably the NSA. Included in that release were eight different...

Firing a Locked Smart Gun
From Schneier on Security

Firing a Locked Smart Gun

The Armatix IP1 "smart gun" can only be fired by someone who is wearing a special watch. Unfortunately, this security measure is easily hackable....

Roombas will Spy on You
From Schneier on Security

Roombas will Spy on You

The company that sells the Roomba autonomous vacuum wants to sell the data about your home that it collects....

Alternatives to Government-Mandated Encryption Backdoors
From Schneier on Security

Alternatives to Government-Mandated Encryption Backdoors

Policy essay: "Encryption Substitutes," by Andrew Keane Woods: In this short essay, I make a few simple assumptions that bear mentioning at the outset. First, I...

US Army Researching Bot Swarms
From Schneier on Security

US Army Researching Bot Swarms

The US Army Research Agency is funding research into autonomous bot swarms. From the announcement: The objective of this CRA is to perform enabling basic and applied...

Friday Squid Blogging: Giant Squid Caught Off the Coast of Ireland
From Schneier on Security

Friday Squid Blogging: Giant Squid Caught Off the Coast of Ireland

It's the second in two months. Video. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my...

Hacking a Segway
From Schneier on Security

Hacking a Segway

The Segway has a mobile app. It is hackable: While analyzing the communication between the app and the Segway scooter itself, Kilbride noticed that a user PIN number...

Ethereum Hacks
From Schneier on Security

Ethereum Hacks

The press is reporting a $32M theft of the cryptocurrency Ethereum. Like all such thefts, they're not a result of a cryptographic failure in the currencies, but...

Password Masking
From Schneier on Security

Password Masking

Slashdot asks if password masking -- replacing password characters with asterisks as you type them -- is on the way out. I don't know if that's true, but I would...

Many of My E-Books for Cheap
From Schneier on Security

Many of My E-Books for Cheap

Humble Bundle is selling a bunch of cybersecurity books very cheaply. You can get copies of Applied Cryptography, Secrets and Lies, and Cryptography Engineering...

Australia Considering New Law Weakening Encryption
From Schneier on Security

Australia Considering New Law Weakening Encryption

News from Australia: Under the law, internet companies would have the same obligations telephone companies do to help law enforcement agencies, Prime Minister Malcolm...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account