acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

The Mathematics of Conspiracy
From Schneier on Security

The Mathematics of Conspiracy

This interesting study tries to build a mathematical model for the continued secrecy of conspiracies, and tries to predict how long before they will be revealed...

Company Tracks Iowa Caucusgoers by their Cell Phones
From Schneier on Security

Company Tracks Iowa Caucusgoers by their Cell Phones

It's not just governments. Companies like Dstillery are doing this too: "We watched each of the caucus locations for each party and we collected mobile device ID's...

WikiLeaks Publishes NSA Target List
From Schneier on Security

WikiLeaks Publishes NSA Target List

As part of an ongoing series of classified NSA target list and raw intercepts, WikiLeaks published details of the NSA's spying on UN Secretary General Ban Ki-Moon...

Lots More Writing about the FBI vs. Apple
From Schneier on Security

Lots More Writing about the FBI vs. Apple

I have written two posts on the case, and at the bottom of those essays are lots of links to other essays written by other people. Here are more links. If you read...

Resilient Systems News: IBM to Buy Resilient Systems
From Schneier on Security

Resilient Systems News: IBM to Buy Resilient Systems

Today, IBM announced its intention to purchase my company, Resilient Systems. (Yes, the rumors were basically true.) I think this is a great development for Resilient...

More on the "Data as Exhaust" Metaphor
From Schneier on Security

More on the "Data as Exhaust" Metaphor

Research paper: Gavin J.D. Smith, "Surveillance, Data and Embodiment: On the Work of Being Watched," Body and Society, January 2016. Abstract: Today's bodies are...

Friday Squid Blogging: Energy Converter Inspired by Squid
From Schneier on Security

Friday Squid Blogging: Energy Converter Inspired by Squid

Engineers have invented a wave energy converter that works in the same way that squid propel themselves through the water. As usual, you can also use this squid...

Notice and Consent
From Schneier on Security

Notice and Consent

New Research: Rebecca Lipman, "Online Privacy and the Invisible Market for Our Data." The paper argues that notice and consent doesn't work, and suggests how is...

Thinking about Intimate Surveillance
From Schneier on Security

Thinking about Intimate Surveillance

Law Professor Karen Levy writes about the rise of surveillance in our most intimate activities -- love, sex, romance -- and how it affects those activities. This...

Simultaneous Discovery of Vulnerabilities
From Schneier on Security

Simultaneous Discovery of Vulnerabilities

In the conversation about zero-day vulnerabilities and whether "good" governments should disclose or hoard vulnerabilities, one of the critical variables is independent...

The Importance of Strong Encryption to Security
From Schneier on Security

The Importance of Strong Encryption to Security

Encryption keeps you safe. Encryption protects your financial details and passwords when you bank online. It protects your cell phone conversations from eavesdroppers...

Eavesdropping by the Foscam Security Camera
From Schneier on Security

Eavesdropping by the Foscam Security Camera

Brian Krebs has a really weird story about the build-in eavesdropping by the Chinese-made Foscam security camera: Imagine buying an internet-enabled surveillance...

Research on Balancing Privacy with Surveillance
From Schneier on Security

Research on Balancing Privacy with Surveillance

Interesting research: Michael Kearns, Aaron Roth, Zhiewi Steven Wu, and Grigory Yaroslavtsev, "Private algorithms for the protected in social network search," PNAS...

The Ads vs. Ad Blockers Arms Race
From Schneier on Security

The Ads vs. Ad Blockers Arms Race

For the past month or so, Forbes has been blocking browsers with ad blockers. Today, I tried to access a Wired article and the site blocked me for the same reason...

Practical TEMPEST Attack
From Schneier on Security

Practical TEMPEST Attack

Four researchers have demonstrated a TEMPEST attack against a laptop, recovering its keys by listening to its electrical emanations. The cost for the attack hardware...

Security Vulnerability in gilbc DNS
From Schneier on Security

Security Vulnerability in gilbc DNS

It's a really bad one....

Decrypting an iPhone for the FBI
From Schneier on Security

Decrypting an iPhone for the FBI

Earlier this week, a federal magistrate ordered Apple to assist the FBI in hacking into the iPhone used by one of the San Bernardino shooters. Apple will fight...

Friday Squid Blogging: Up Close and Personal with a Giant Squid
From Schneier on Security

Friday Squid Blogging: Up Close and Personal with a Giant Squid

Fascinating story. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Security Implications of Cash
From Schneier on Security

Security Implications of Cash

I saw two related stories today. The first is about high-denomination currency. The EU is considering dropping its 500-euro note, on the grounds that only criminals...

Underage Hacker Is behind Attacks against US Government
From Schneier on Security

Underage Hacker Is behind Attacks against US Government

It's a teenager: British police have arrested a teenager who allegedly was behind a series of audacious -- and, for senior U.S. national security officials, embarrassing...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account