acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Another Scandal Resulting from E-mails Gone Public
From Schneier on Security

Another Scandal Resulting from E-mails Gone Public

A lot of Pennsylvania government officials are being hurt as a result of e-mails being made public. This is all the result of a political pressure to release the...

PayPal Authentication Still Substandard
From Schneier on Security

PayPal Authentication Still Substandard

Brian Krebs has the story. Bottom line: PayPal has no excuse for this kind of stuff. I hope the public shaming incents them to offer better authentication for its...

DMCA and the Internet of Things
From Schneier on Security

DMCA and the Internet of Things

In theory, the Internet of Things -- the connected network of tiny computers inside home appliances, household objects, even clothing -- promises to make your life...

NSA/GCHQ Exploits Against Juniper Networking Equipment
From Schneier on Security

NSA/GCHQ Exploits Against Juniper Networking Equipment

The Intercept just published a 2011 GCHQ document outlining their exploit capabilities against Juniper networking equipment, including routers and NetScreen firewalls...

Friday Squid Blogging: Squid Christmas
From Schneier on Security

Friday Squid Blogging: Squid Christmas

Squid sighting in this Christmas cartoon. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. And...

Burglary Footage Turned into Commercial
From Schneier on Security

Burglary Footage Turned into Commercial

Earlier this month, a Las Vegas taco shop was robbed in the middle of the night. The restaurant took the surveillance-video footage and turned it into a combination...

Police Dog Sniffs for Hard Drives
From Schneier on Security

Police Dog Sniffs for Hard Drives

This weird story describes a "porn dog" that is trained to find hidden hard drives. It's used in child porn investigations. I suppose it's reasonable that computer...

Using Law Against Technology
From Schneier on Security

Using Law Against Technology

On Thursday, a Brazilian judge ordered the text messaging service WhatsApp shut down for 48 hours. It was a monumental action. WhatsApp is the most popular app...

More Writings on the Second Crypto Wars
From Schneier on Security

More Writings on the Second Crypto Wars

Two things to read: "Wanting It Bad Enough Won't Make It Work: Why Adding Backdoors and Weakening Encryption Threatens the Internet," by Meredith Whittaker and...

"The Medieval Origins of Mass Surveillance"
From Schneier on Security

"The Medieval Origins of Mass Surveillance"

This interesting article by medieval historian Amanda Power traces our culture's relationship with the concept of mass surveillance from the medieval characterization...

Back Door in Juniper Firewalls
From Schneier on Security

Back Door in Juniper Firewalls

Juniper has warned about a malicious back door in their firewalls that automatically decrypts VPN traffic. It's been there for years. Hopefully details are forthcoming...

Friday Squid Blogging: Penguins Fight over Squid
From Schneier on Security

Friday Squid Blogging: Penguins Fight over Squid

Watch this video of gentoo penguins fighting over a large squid. This underwater brawl was captured on a video camera taped to the back of the second penguin, revealing...

GCHQ Holiday Puzzle
From Schneier on Security

GCHQ Holiday Puzzle

If you like puzzles, GCHQ has one for you. Just don't let it distract you from fighting the UK legislation giving the GCHQ new surveillance powers....

25th Anniversary of the Landmark Unix Security Book
From Schneier on Security

25th Anniversary of the Landmark Unix Security Book

Gene Spafford writes about the history of Practical Unix Security....

Catalog of Police Surveillance Equipment
From Schneier on Security

Catalog of Police Surveillance Equipment

The Intercept has "a secret, internal U.S. government catalogue of dozens of cellphone surveillance devices used by the military and by intelligence agencies."...

User Errors Often Compromise Encryption
From Schneier on Security

User Errors Often Compromise Encryption

This should come as no surprise: users often compromise their own security by making mistakes setting up and using their encryption apps. Paper: "On the Security...

DOS Attack Against Los Angeles Schools
From Schneier on Security

DOS Attack Against Los Angeles Schools

Yesterday, the city of Los Angeles closed all of its schools -- over 1,000 schools -- because of a bomb threat. It was a hoax. LA officials defended the move, with...

Attack Against DNS Root Servers
From Schneier on Security

Attack Against DNS Root Servers

Has anyone been following the attack against the DNS root servers two weeks ago? Details. I can't precisely explain why, but this feels like someone testing an...

"Security Theater" Sighting
From Schneier on Security

"Security Theater" Sighting

In a Schlock Mercenary comic....

Good Swatting Story
From Schneier on Security

Good Swatting Story

The New York Times Magazine has a good story about swatting, centering around a Canadian teenager who did it over a hundred times....
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account