acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

New White House Privacy Report
From Schneier on Security

New White House Privacy Report

Two days ago, the White House released a report on privacy: "Privacy in our Digital Lives: Protecting Individuals and Promoting Innovation." The report summarizes...

Heartbeat as Biometric Password
From Schneier on Security

Heartbeat as Biometric Password

There's research in using a heartbeat as a biometric password. No details in the article. My guess is that there isn't nearly enough entropy in the reproducible...

Brian Krebs Uncovers Murai Botnet Author
From Schneier on Security

Brian Krebs Uncovers Murai Botnet Author

Really interesting investigative story....

WhatsApp Security Vulnerability
From Schneier on Security

WhatsApp Security Vulnerability

Back in March, Rolf Weber wrote about a potential vulnerability in the WhatsApp protocol that would allow Facebook to defeat perfect forward secrecy by forcibly...

Cloudflare's Experience with a National Security Letter
From Schneier on Security

Cloudflare's Experience with a National Security Letter

Interesting post on Cloudflare's experience with receiving a National Security Letter. News article....

Friday Squid Blogging: 1874 Giant Squid Attack
From Schneier on Security

Friday Squid Blogging: 1874 Giant Squid Attack

This article discusses a giant squid attack on a schooner off the coast of Sri Lanka in 1874. As usual, you can also use this squid post to talk about the security...

A Comment on the Trump Dossier
From Schneier on Security

A Comment on the Trump Dossier

Imagine that you are someone in the CIA, concerned about the future of America. You have this Russian dossier on Donald Trump, which you have some evidence might...

Internet Filtering in Authoritarian Regimes
From Schneier on Security

Internet Filtering in Authoritarian Regimes

Interesting research: Sebastian Hellmeier, "The Dictator's Digital Toolkit: Explaining Variation in Internet Filtering in Authoritarian Regimes," Politics & Policy...

NSA Given More Ability to Share Raw Intelligence Data
From Schneier on Security

NSA Given More Ability to Share Raw Intelligence Data

President Obama has changed the rules regarding raw intelligence, allowing the NSA to share raw data with the US's other 16 intelligence agencies. The new rules...

Twofish Power Analysis Attack
From Schneier on Security

Twofish Power Analysis Attack

New paper: "A Simple Power Analysis Attack on the Twofish Key Schedule." This shouldn't be a surprise; these attacks are devastating if you don't take steps to...

Law Enforcement Access to IoT Data
From Schneier on Security

Law Enforcement Access to IoT Data

In the first of what will undoubtedly be a large number of battles between companies that make IoT devices and the police, Amazon is refusing to comply with a warrant...

Should Elections Be Classified as "Critical Infrastructure"?
From Schneier on Security

Should Elections Be Classified as "Critical Infrastructure"?

I am co-author on a paper discussing whether elections be classified as "critical infrastructure" in the US, based on experiences in other countries: Abstract:...

FDA Recommendations on Medical-Device Cybersecurity
From Schneier on Security

FDA Recommendations on Medical-Device Cybersecurity

The FDA has issued a report giving medical devices guidance on computer and network security. There's nothing particularly new or interesting; it reads like standard...

Attributing the DNC Hacks to Russia
From Schneier on Security

Attributing the DNC Hacks to Russia

President Barack Obama's public accusation of Russia as the source of the hacks in the US presidential election and the leaking of sensitive e-mails through WikiLeaks...

Friday Squid Blogging: Simple Grilled Squid Recipe
From Schneier on Security

Friday Squid Blogging: Simple Grilled Squid Recipe

Easy recipe from America's Test Kitchen. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

The Effect of Real Names on Online Behavior
From Schneier on Security

The Effect of Real Names on Online Behavior

Good article debunking the myth that requiring people to use their real names on the Internet makes them behave better....

Cryptographic Capabilities of the Barbie Typewriter
From Schneier on Security

Cryptographic Capabilities of the Barbie Typewriter

They're not much, but they do exist....

An SQL Injection Attack Is a Legal Company Name in the UK
From Schneier on Security

An SQL Injection Attack Is a Legal Company Name in the UK

Someone just registered their company name as ; DROP TABLE "COMPANIES";-- LTD. Reddit thread. Obligatory xkcd comic....

Are We Becoming More Moral Faster Than We're Becoming More Dangerous?
From Schneier on Security

Are We Becoming More Moral Faster Than We're Becoming More Dangerous?

In The Better Angels of Our Nature, Steven Pinker convincingly makes the point that by pretty much every measure you can think of, violence has declined on our...

Class Breaks
From Schneier on Security

Class Breaks

There's a concept from computer security known as a class break. It's a particular security vulnerability that breaks not just one system, but an entire class of...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account