acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Gaming Google News
From Schneier on Security

Gaming Google News

Turns out that it's surprisingly easy to game: It appears that news sites deemed legitimate by Google News are being modified by third parties. These sites are...

Millennials and Secret Leaking
From Schneier on Security

Millennials and Secret Leaking

I hesitate to blog this, because it's an example of everything that's wrong with pop psychology. Malcolm Harris writes about millennials, and has a theory of why...

Data vs. Analysis in Counterterrorism
From Schneier on Security

Data vs. Analysis in Counterterrorism

This article argues that Britain's counterterrorism problem isn't lack of data, it's lack of analysis....

The grugq on Reality Winner, the Intercept, and OPSEC
From Schneier on Security

The grugq on Reality Winner, the Intercept, and OPSEC

Good commentary....

Security Flaws in 4G VoLTE
From Schneier on Security

Security Flaws in 4G VoLTE

Research paper: "Subscribers remote geolocation and tracking using 4G VoLTE enabled Android phone," by Patrick Ventuzelo, Olivier Le Moal, and Thomas Coudray. Abstract...

Chelsea Manning Profiled in New York Times Magazine
From Schneier on Security

Chelsea Manning Profiled in New York Times Magazine

Interesting reading....

Healthcare Industry Cybersecurity Report
From Schneier on Security

Healthcare Industry Cybersecurity Report

New US government report: "Report on Improving Cybersecurity in the Health Care Industry." It's pretty scathing, but nothing in it will surprise regular readers...

Friday Squid Blogging: Sex Is Traumatic for the Female Dumpling Squid
From Schneier on Security

Friday Squid Blogging: Sex Is Traumatic for the Female Dumpling Squid

The more they mate, the sooner they die. Academic paper (paywall). News article. As usual, you can also use this squid post to talk about the security stories in...

NSA Document Outlining Russian Attempts to Hack Voter Rolls
From Schneier on Security

NSA Document Outlining Russian Attempts to Hack Voter Rolls

This week brought new public evidence about Russian interference in the 2016 election. On Monday, the Intercept published a top-secret National Security Agency...

Safety and Security and the Internet of Things
From Schneier on Security

Safety and Security and the Internet of Things

Ross Anderson blogged about his new paper on security and safety concerns about the Internet of Things. (See also this short video.) It's very much along the lines...

Surveillance Intermediaries
From Schneier on Security

Surveillance Intermediaries

Interesting law-journal article: "Surveillance Intermediaries," by Alan Z. Rozenshtein. Abstract:Apple's 2016 fight against a court order commanding it to help...

Spear Phishing Attacks
From Schneier on Security

Spear Phishing Attacks

Really interesting research: "Unpacking Spear Phishing Susceptibility," by Zinaida Benenson, Freya Gassmann, and Robert Landwirth. Abstract: We report the results...

CIA's Pandemic Toolkit
From Schneier on Security

CIA's Pandemic Toolkit

WikiLeaks is still dumping CIA cyberweapons on the Internet. Its latest dump is something called "Pandemic": The Pandemic leak does not explain what the CIA's initial...

Friday Squid Blogging: Squid as Prey
From Schneier on Security

Friday Squid Blogging: Squid as Prey

There's lots of video of squid as undersea predators. This is one of the few instances of squid as prey (from a deep submersible in the Pacific): "We saw brittle...

WannaCry and Vulnerabilities
From Schneier on Security

WannaCry and Vulnerabilities

There is plenty of blame to go around for the WannaCry ransomware that spread throughout the Internet earlier this month, disrupting work at hospitals, factories...

Passwords at the Border
From Schneier on Security

Passwords at the Border

The password-manager 1Password has just implemented a travel mode that tries to protect users while crossing borders. It doesn't make much sense. To enable it,...

Post-Quantum RSA
From Schneier on Security

Post-Quantum RSA

Interesting research on a version of RSA that is secure against a quantum computer: Post-quantum RSA Daniel J. Bernstein, Nadia Heninger, Paul Lou, and Luke Valenta...

Inmates Secretly Build and Network Computers while in Prison
From Schneier on Security

Inmates Secretly Build and Network Computers while in Prison

This is kind of amazing: Inmates at a medium-security Ohio prison secretly assembled two functioning computers, hid them in the ceiling, and connected them to the...

Who Are the Shadow Brokers?
From Schneier on Security

Who Are the Shadow Brokers?

In 2013, a mysterious group of hackers that calls itself the Shadow Brokers stole a few disks full of NSA secrets. Since last summer, they've been dumping these...

Tainted Leaks
From Schneier on Security

Tainted Leaks

Last year, I wrote about the potential for doxers to alter documents before they leaked them. It was a theoretical threat when I wrote it, but now Citizen Lab has...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account