acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

New SSH Vulnerability
From Schneier on Security

New SSH Vulnerability

This is interesting: For the first time, researchers have demonstrated that a large portion of cryptographic keys used to protect data in computer-to-server SSH...

Upcoming Speaking Engagements
From Schneier on Security

Upcoming Speaking Engagements

This is a current list of where and when I am scheduled to speak: I’m speaking at the AI Summit New York on December 6, 2023. The list is maintained on this page...

How .tk Became a TLD for Scammers
From Schneier on Security

How .tk Became a TLD for Scammers

Sad story of Tokelau, and how its top-level domain “became the unwitting host to the dark underworld by providing a never-ending supply of domain names that could...

Ten Ways AI Will Change Democracy
From Schneier on Security

Ten Ways AI Will Change Democracy

Artificial intelligence will change so many aspects of society, largely in ways that we cannot conceive of yet. Democracy, and the systems of governance that surround...

Friday Squid Blogging: The History and Morality of US Squid Consumption
From Schneier on Security

Friday Squid Blogging: The History and Morality of US Squid Consumption

Really interesting article. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting...

The Privacy Disaster of Modern Smart Cars
From Schneier on Security

The Privacy Disaster of Modern Smart Cars

Article based on a Mozilla report.

Online Retail Hack
From Schneier on Security

Online Retail Hack

Selling miniature replicas to unsuspecting shoppers: Online marketplaces sell tiny pink cowboy hats. They also sell miniature pencil sharpeners, palm-size kitchen...

Decoupling for Security
From Schneier on Security

Decoupling for Security

This is an excerpt from a longer paper. You can read the whole thing (complete with sidebars and illustrations) here. Our message is simple: it is possible to get...

Spaf on the Morris Worm
From Schneier on Security

Spaf on the Morris Worm

Gene Spafford wrote an essay reflecting on the Morris Worm of 1988—35 years ago. His lessons from then are still applicable today.

Crashing iPhones with a Flipper Zero
From Schneier on Security

Crashing iPhones with a Flipper Zero

The Flipper Zero is an incredibly versatile hacking device. Now it can be used to <a href="https://arstechnica.com/security/2023/11/flipper-zero-gadget-that-doses...

Friday Squid Blogging: Eating Dancing Squid
From Schneier on Security

Friday Squid Blogging: Eating Dancing Squid

It’s not actually alive, but it twitches in response to soy sauce. As usual, you can also use this squid post to talk about the security stories in the news that...

New York Increases Cybersecurity Rules for Financial Companies
From Schneier on Security

New York Increases Cybersecurity Rules for Financial Companies

Another example of a large and influential state doing things the federal government won’t: Boards of directors, or other senior committees, are charged with overseeing...

Spyware in India
From Schneier on Security

Spyware in India

Apple has warned leaders of the opposition government in India that their phones are being spied on: Multiple top leaders of India’s opposition parties and several...

The Future of Drone Warfare
From Schneier on Security

The Future of Drone Warfare

Ukraine is using $400 drones to destroy tanks: Facing an enemy with superior numbers of troops and armor, the Ukrainian defenders are holding on with the help...

Hacking Scandinavian Alcohol Tax
From Schneier on Security

Hacking Scandinavian Alcohol Tax

The islands of Åland are an important tax hack: Although Åland is part of the Republic of Finland, it has its own autonomous parliament. In areas where Åland has...

Friday Squid Blogging: On the Ugliness of Squid Fishing
From Schneier on Security

Friday Squid Blogging: On the Ugliness of Squid Fishing

And seafood in general: A squid ship is a bustling, bright, messy place. The scene on deck looks like a mechanic’s garage where an oil change has gone terribly...

Messaging Service Wiretap Discovered through Expired TLS Cert
From Schneier on Security

Messaging Service Wiretap Discovered through Expired TLS Cert

Fascinating story of a covert wiretap that was discovered because of an expired TLS certificate: The suspected man-in-the-middle attack was identified when the...

New NSA Information from (and About) Snowden
From Schneier on Security

New NSA Information from (and About) Snowden

Interesting article about the Snowden documents, including comments from former Guardian editor Ewen MacAskill MacAskill, who shared the Pulitzer Prize for Public...

Microsoft is Soft-Launching Security Copilot
From Schneier on Security

Microsoft is Soft-Launching Security Copilot

Microsoft has announced an early access program for its LLM-based security chatbot assistant: Security Copilot. I am curious whether this thing is actually useful...

Child Exploitation and the Crypto Wars
From Schneier on Security

Child Exploitation and the Crypto Wars

Susan Landau published an excellent essay on the current justification for the government breaking end-to-end-encryption: child sexual abuse and exploitation (CSAE)...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account