acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Photocopier Security
From Schneier on Security

Photocopier Security

A modern photocopier is basically a computer with a scanner and printer attached. This computer has a hard drive, and scans of images are regularly stored on that...

Friday Squid Blogging: Will Fish and Chips Become Squid and Chips?
From Schneier on Security

Friday Squid Blogging: Will Fish and Chips Become Squid and Chips?

BBC.com reports that squid are proliferating around the North Sea, and speculates that they will become an increasingly common British dinner. As usual, you can...

Effects of the 2011 DigiNotar Attack
From Schneier on Security

Effects of the 2011 DigiNotar Attack

Nice article on the 2011 DigiNotar attack and how it changed security practices in the CA industry....

How Signal Is Evading Censorship
From Schneier on Security

How Signal Is Evading Censorship

Signal, the encrypted messaging app I prefer, is being blocked in both Egypt and the UAE. Recently, the Signal team developed a workaround: domain fronting. Signal's...

Security Risks of TSA PreCheck
From Schneier on Security

Security Risks of TSA PreCheck

Former TSA Administrator Kip Hawley wrote an op-ed pointing out the security vulnerabilities in the TSA's PreCheck program: The first vulnerability in the system...

Friday Squid Blogging: Squidmas Cards
From Schneier on Security

Friday Squid Blogging: Squidmas Cards

Merry Squidmas. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Russian Military Using Smart Phones to Track Troop Movements
From Schneier on Security

Russian Military Using Smart Phones to Track Troop Movements

Crowdstrike has an interesting blog post about how the Russian military is tracking Ukranian field artillery units by compromising soldiers' smart phones and tracking...

NIST is Continuing to Work on Post-Quantum-Computing Cryptography Standards
From Schneier on Security

NIST is Continuing to Work on Post-Quantum-Computing Cryptography Standards

NIST is accepting proposals for public-key algorithms immune to quantum computing techniques. Details here. Deadline is the end of November 2017. I applaud NIST...

The Future of Faking Audio and Video
From Schneier on Security

The Future of Faking Audio and Video

This Verge article isn't great, but we are certainly moving into a future where audio and video will be easy to fake, and easier to fake undetectably. This is going...

The Pro-PGP Position
From Schneier on Security

The Pro-PGP Position

A few days ago I blogged an excellent essay by Filippo Valsorda on why he's giving up on PGP. Neal Walkfield wrote a good rebuttal. I am on Valsorda's side. I don't...

Encryption Working Group Annual Report from the US House of Representatives
From Schneier on Security

Encryption Working Group Annual Report from the US House of Representatives

The Encryption Working Group of the House Judiciary Committee and the House Energy and Commerce Committee has released its annual report. Observation #1: Any measure...

Google Releases Crypto Test Suite
From Schneier on Security

Google Releases Crypto Test Suite

Google has released Project Wycheproof a test suite designed to test cryptographic libraries against a series of known attacks. From a blog post: In cryptography...

Smartphone Spying as Art
From Schneier on Security

Smartphone Spying as Art

A film student put spyware on a smartphone and then allowed it to be stolen. He made a movie of the results....

UN Considering Killer Robot Ban
From Schneier on Security

UN Considering Killer Robot Ban

This would be a good idea, although I can't imagine countries like the US, China, and Russia going along with it -- at least not right now....

Friday Squid Blogging: Woman Throws Squid at Her Boyfriend
From Schneier on Security

Friday Squid Blogging: Woman Throws Squid at Her Boyfriend

This is what passes for news these days. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Giving Up on PGP
From Schneier on Security

Giving Up on PGP

Filippo Valsorda wrote an exellent essay on why he's giving up on PGP. I have long believed PGP to be more trouble than it is worth. It's hard to use correctly,...

Impressive Social Engineering Display
From Schneier on Security

Impressive Social Engineering Display

In this impressive lc7scxvKQOo">social-engineering display, a hacker convinces a cell phone tech-support person to change an account password without being verified...

My Priorities for the Next Four Years
From Schneier on Security

My Priorities for the Next Four Years

Like many, I was surprised and shocked by the election of Donald Trump as president. I believe his ideas, temperament, and inexperience represent a grave threat...

Let's Encrypt Is Making Web Encryption Easier
From Schneier on Security

Let's Encrypt Is Making Web Encryption Easier

That's the conclusion of a research paper: Once [costs and complexity] are eliminated, it enables big hosting providers to issue and deploy certificates for their...

Hiding Information in Silver and Carbon Ink
From Schneier on Security

Hiding Information in Silver and Carbon Ink

Interesting: "We used silver and carbon ink to print an image consisting of small rods that are about a millimeter long and a couple of hundred microns wide," said...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account