acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Encryption Policy and Freedom of the Press
From Schneier on Security

Encryption Policy and Freedom of the Press

Interesting law journal article: "Encryption and the Press Clause," by D. Victoria Barantetsky. Abstract: Almost twenty years ago, a hostile debate over whether...

Acoustic Attack Against Accelerometers
From Schneier on Security

Acoustic Attack Against Accelerometers

Interesting acoustic attack against the MEMS accelerometers in devices like FitBits. Millions of accelerometers reside inside smartphones, automobiles, medical...

Soon You'll Be Able to Hijack Weaponized Police Drones in Connecticut
From Schneier on Security

Soon You'll Be Able to Hijack Weaponized Police Drones in Connecticut

Not content with having a fleet of insecure surveillance drones, the state of Connecticut wants a fleet of insecure weaponized drones. What could possibly go wrong...

Friday Squid Blogging: 1887 Animal-Combat Print with Giant Squid
From Schneier on Security

Friday Squid Blogging: 1887 Animal-Combat Print with Giant Squid

Great Victorian animal-combat scene featuring a giant squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven't...

Finding FBI Director James Comey's Twitter Account
From Schneier on Security

Finding FBI Director James Comey's Twitter Account

An interesting story of uncovering an anonymous Internet social media account....

Congress Removes FCC Privacy Protections on Your Internet Usage
From Schneier on Security

Congress Removes FCC Privacy Protections on Your Internet Usage

Think about all of the websites you visit every day. Now imagine if the likes of Time Warner, AT&T, and Verizon collected all of your browsing history and sold...

Security Orchestration and Incident Response
From Schneier on Security

Security Orchestration and Incident Response

Last month at the RSA Conference, I saw a lot of companies selling security incident response automation. Their promise was to replace people with computers ­--...

Kalyna Block Cipher
From Schneier on Security

Kalyna Block Cipher

Kalyna is a block cipher that became a Ukrainian national standard in 2015. It supports block and key sizes of 128, 256, and 512 bits. Its structure looks like...

The TSA's Selective Laptop Ban
From Schneier on Security

The TSA's Selective Laptop Ban

Last Monday, the TSA announced a peculiar new security measure to take effect within 96 hours. Passengers flying into the US on foreign airlines from eight Muslim...

Friday Squid Blogging: Squid from Utensils
From Schneier on Security

Friday Squid Blogging: Squid from Utensils

Available on eBay. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Commenting Policy for This Blog
From Schneier on Security

Commenting Policy for This Blog

Over the past few months, I have been watching my blog comments decline in civility. I blame it in part on the contentious US election and its aftermath. It's also...

Second WikiLeaks Dump of CIA Documents
From Schneier on Security

Second WikiLeaks Dump of CIA Documents

There are more CIA documents up on WikiLeaks. It seems to be mostly MacOS and iOS. News article....

Hackers Threaten to Erase Apple Customer Data
From Schneier on Security

Hackers Threaten to Erase Apple Customer Data

Turkish hackers are threatening to erase millions of iCloud user accounts unless Apple pays a ransom. This is a weird story, and I'm skeptical of some of the details...

NSA Best Scientific Cybersecurity Paper Competition
From Schneier on Security

NSA Best Scientific Cybersecurity Paper Competition

Every year, the NSA has a competition for the best cybersecurity paper. Winners get to go to the NSA to pick up the award. (Warning: you will almost certainly be...

New Paper on Encryption Workarounds
From Schneier on Security

New Paper on Encryption Workarounds

I have written a paper with Orin Kerr on encryption workarounds. Our goal wasn't to make any policy recommendations. (That was a good thing, since we probably don't...

NSA Documents from before 1930
From Schneier on Security

NSA Documents from before 1930

Here is a listing of all the documents that the NSA has in its archives that are dated earlier than 1930....

WikiLeaks Not Disclosing CIA-Hoarded Vulnerabilities to Companies
From Schneier on Security

WikiLeaks Not Disclosing CIA-Hoarded Vulnerabilities to Companies

WikiLeaks has started publishing a large collection of classified CIA documents, including information on several -- possibly many -- unpublished (i.e., zero-day)...

Friedman Comments on Yardley
From Schneier on Security

Friedman Comments on Yardley

This is William Friedman's highly annotated copy of Herbert Yardley's book, The American Black Chamber....

Security Vulnerabilities in Mobile MAC Randomization
From Schneier on Security

Security Vulnerabilities in Mobile MAC Randomization

Interesting research: "A Study of MAC Address Randomization in Mobile Devices When it Fails": Abstract: Media Access Control (MAC) address randomization is a privacy...

Friday Squid Blogging: Squid Catches Down in Argentina
From Schneier on Security

Friday Squid Blogging: Squid Catches Down in Argentina

News from the South Atlantic: While the outlook is good at present, it is too early to predict what the final balance of this season will be. The sector is totally...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account