acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Capturing Pattern-Lock Authentication
From Schneier on Security

Capturing Pattern-Lock Authentication

Interesting research -- "Cracking Android Pattern Lock in Five Attempts": Abstract: Pattern lock is widely used as a mechanism for authentication and authorization...

How the Media Influences Our Fear of Terrorism
From Schneier on Security

How the Media Influences Our Fear of Terrorism

Good article that crunches the data and shows that the press's coverage of terrorism is disproportional to its comparative risk. This isn't new. I've written about...

Obama's Legacy in Internet Security
From Schneier on Security

Obama's Legacy in Internet Security

NextGov has a nice article summarizing President Obama's accomplishments in Internet security: what he did, what he didn't do, and how it turned out....

Friday Squid Blogging: Know Your Cephalopods
From Schneier on Security

Friday Squid Blogging: Know Your Cephalopods

This graphic shows the important difference between arms and tentacles. As usual, you can also use this squid post to talk about the security stories in the news...

New White House Privacy Report
From Schneier on Security

New White House Privacy Report

Two days ago, the White House released a report on privacy: "Privacy in our Digital Lives: Protecting Individuals and Promoting Innovation." The report summarizes...

Heartbeat as Biometric Password
From Schneier on Security

Heartbeat as Biometric Password

There's research in using a heartbeat as a biometric password. No details in the article. My guess is that there isn't nearly enough entropy in the reproducible...

Brian Krebs Uncovers Murai Botnet Author
From Schneier on Security

Brian Krebs Uncovers Murai Botnet Author

Really interesting investigative story....

WhatsApp Security Vulnerability
From Schneier on Security

WhatsApp Security Vulnerability

Back in March, Rolf Weber wrote about a potential vulnerability in the WhatsApp protocol that would allow Facebook to defeat perfect forward secrecy by forcibly...

Cloudflare's Experience with a National Security Letter
From Schneier on Security

Cloudflare's Experience with a National Security Letter

Interesting post on Cloudflare's experience with receiving a National Security Letter. News article....

Friday Squid Blogging: 1874 Giant Squid Attack
From Schneier on Security

Friday Squid Blogging: 1874 Giant Squid Attack

This article discusses a giant squid attack on a schooner off the coast of Sri Lanka in 1874. As usual, you can also use this squid post to talk about the security...

A Comment on the Trump Dossier
From Schneier on Security

A Comment on the Trump Dossier

Imagine that you are someone in the CIA, concerned about the future of America. You have this Russian dossier on Donald Trump, which you have some evidence might...

Internet Filtering in Authoritarian Regimes
From Schneier on Security

Internet Filtering in Authoritarian Regimes

Interesting research: Sebastian Hellmeier, "The Dictator's Digital Toolkit: Explaining Variation in Internet Filtering in Authoritarian Regimes," Politics & Policy...

NSA Given More Ability to Share Raw Intelligence Data
From Schneier on Security

NSA Given More Ability to Share Raw Intelligence Data

President Obama has changed the rules regarding raw intelligence, allowing the NSA to share raw data with the US's other 16 intelligence agencies. The new rules...

Twofish Power Analysis Attack
From Schneier on Security

Twofish Power Analysis Attack

New paper: "A Simple Power Analysis Attack on the Twofish Key Schedule." This shouldn't be a surprise; these attacks are devastating if you don't take steps to...

Law Enforcement Access to IoT Data
From Schneier on Security

Law Enforcement Access to IoT Data

In the first of what will undoubtedly be a large number of battles between companies that make IoT devices and the police, Amazon is refusing to comply with a warrant...

Should Elections Be Classified as "Critical Infrastructure"?
From Schneier on Security

Should Elections Be Classified as "Critical Infrastructure"?

I am co-author on a paper discussing whether elections be classified as "critical infrastructure" in the US, based on experiences in other countries: Abstract:...

FDA Recommendations on Medical-Device Cybersecurity
From Schneier on Security

FDA Recommendations on Medical-Device Cybersecurity

The FDA has issued a report giving medical devices guidance on computer and network security. There's nothing particularly new or interesting; it reads like standard...

Attributing the DNC Hacks to Russia
From Schneier on Security

Attributing the DNC Hacks to Russia

President Barack Obama's public accusation of Russia as the source of the hacks in the US presidential election and the leaking of sensitive e-mails through WikiLeaks...

Friday Squid Blogging: Simple Grilled Squid Recipe
From Schneier on Security

Friday Squid Blogging: Simple Grilled Squid Recipe

Easy recipe from America's Test Kitchen. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

The Effect of Real Names on Online Behavior
From Schneier on Security

The Effect of Real Names on Online Behavior

Good article debunking the myth that requiring people to use their real names on the Internet makes them behave better....
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account