acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Research into IoT Security Is Finally Legal
From Schneier on Security

Research into IoT Security Is Finally Legal

For years, the DMCA has been used to stifle legitimate research into the security of embedded systems. Finally, the research exemption to the DMCA is in effect...

Friday Squid Blogging: Whale Hunts Squid
From Schneier on Security

Friday Squid Blogging: Whale Hunts Squid

A sperm whale has been sighted in Monterey Bay, hunting squid. As usual, you can also use this squid post to talk about the security stories in the news that I...

Hacking in the Movies
From Schneier on Security

Hacking in the Movies

New Atlas has a great three-part feature on the history of hacking as portrayed in films, including video clips. The 1980s. The 1990s. The 2000s....

Google Linking Anonymous Browser Tracking with Identifiable Tracking
From Schneier on Security

Google Linking Anonymous Browser Tracking with Identifiable Tracking

Google's new ways to violate your privacy and -- more importantly -- how to opt out....

Teaching a Neural Network to Encrypt
From Schneier on Security

Teaching a Neural Network to Encrypt

Researchers have trained a neural network to encrypt its communications. In their experiment, computers were able to make their own form of encryption using machine...

Free Cybersecurity MOOC from F-Secure and the University of Finland
From Schneier on Security

Free Cybersecurity MOOC from F-Secure and the University of Finland

Looks interesting. Finnish residents can take it for credit....

Edward Snowden's Boss at Booz Allen Hamilton Speaks
From Schneier on Security

Edward Snowden's Boss at Booz Allen Hamilton Speaks

Interesting. I have no idea how much of it to believe....

Another Shadow Brokers Leak
From Schneier on Security

Another Shadow Brokers Leak

There's another leak of NSA hacking tools and data from the Shadow Brokers. This one includes a list of hacked sites. According to analyses from researchers here...

Card Game Based on the Iterated Prisoner's Dilemma
From Schneier on Security

Card Game Based on the Iterated Prisoner's Dilemma

Interesting....

How to Avoid Kidnapping Children on Halloween
From Schneier on Security

How to Avoid Kidnapping Children on Halloween

A useful guide....

A High-End Card-Reading Device
From Schneier on Security

A High-End Card-Reading Device

An impressive Chinese device that automatically reads marked cards in order to cheat at poker and other card games....

Friday Squid Blogging: Squid Nebula
From Schneier on Security

Friday Squid Blogging: Squid Nebula

Beautiful. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Eavesdropping on Typing Over Voice-Over-IP
From Schneier on Security

Eavesdropping on Typing Over Voice-Over-IP

Interesting research: "Don't Skype & Type! Acoustic Eavesdropping in Voice-Over-IP": Abstract: Acoustic emanations of computer keyboards represent a serious privacy...

Hardware Bit-Flipping Attacks in Practice
From Schneier on Security

Hardware Bit-Flipping Attacks in Practice

A year and a half ago, I wrote about hardware bit-flipping attacks, which were then largely theoretical. Now, they can be used to root Android phones: The breakthrough...

How Powell's and Podesta's E-mail Accounts Were Hacked
From Schneier on Security

How Powell's and Podesta's E-mail Accounts Were Hacked

It was a phishing attack....

OPM Attack
From Schneier on Security

OPM Attack

Good long article on the 2015 attack against the US Office of Personnel Management....

Malicious AI
From Schneier on Security

Malicious AI

It's not hard to imagine the criminal possibilities of automation, autonomy, and artificial intelligence. But the imaginings are becoming mainstream -- and the...

UK Admitting "Offensive Cyber" Against ISIS/Daesh
From Schneier on Security

UK Admitting "Offensive Cyber" Against ISIS/Daesh

I think this might be the first time it has been openly acknowledged: Sir Michael Fallon, the defence secretary, has said Britain is using cyber warfare in the...

How Different Stakeholders Frame Security
From Schneier on Security

How Different Stakeholders Frame Security

Josephine Wolff examines different Internet governance stakeholders and how they frame security debates. Her conclusion: The tensions that arise around issues of...

DDoS Attacks against Dyn
From Schneier on Security

DDoS Attacks against Dyn

Yesterday's DDoS attacks against Dyn are being reported everywhere. I have received a gazillion press requests, but I am traveling in Australia and Asia and have...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account