acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Security for the Rest of Us
From Schneier on Security

Security for the Rest of Us

Good fictional account of an average computer user and how people understand and view security. Related: "Real World Use Cases for High-Risk Users."...

Nicholas Weaver on iPhone Security
From Schneier on Security

Nicholas Weaver on iPhone Security

Excellent essay: Yes, an iPhone configured with a proper password has enough protection that, turned off, I'd be willing to hand mine over to the DGSE, NSA, or...

Face Recognition by Thermal Imaging
From Schneier on Security

Face Recognition by Thermal Imaging

New research can identify a person by reading their thermal signature in complete darkness and then matching it with ordinary photographs. Research paper: Abstract...

Shooting Down Drones
From Schneier on Security

Shooting Down Drones

A Kentucky man shot down a drone that was hovering in his backyard: "It was just right there," he told Ars. "It was hovering, I would never have shot it if it was...

Vulnerabilities in Brink's Smart Safe
From Schneier on Security

Vulnerabilities in Brink's Smart Safe

Brink's sells an Internet-enabled smart safe called the CompuSafe Galileo. Despite being sold as a more secure safe, it's wildly insecure: Vulnerabilities found...

Help with Mailing List Hosting
From Schneier on Security

Help with Mailing List Hosting

I could use some help finding a host for my monthly newsletter, Crypto-Gram. My old setup just wasn't reliable enough. I had a move planned, but that fell through...

John Mueller on the Overblown ISIS Threat
From Schneier on Security

John Mueller on the Overblown ISIS Threat

John Mueller has a good essay on how the ISIS threat is overblown....

Friday Squid Blogging: Russian Sailors Video Colossal Squid
From Schneier on Security

Friday Squid Blogging: Russian Sailors Video Colossal Squid

It tried to steal their catch. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Schneier Speaking Schedule
From Schneier on Security

Schneier Speaking Schedule

I'm speaking at an Infoedge event at Bali Hai Golf Club in Las Vegas, at 5 PM on August 5, 2015. I'm speaking at DefCon 23 on Friday, August 7, 2015. I'm speaking...

HAMMERTOSS: New Russian Malware
From Schneier on Security

HAMMERTOSS: New Russian Malware

Fireeye has a detailed report of a sophisticated piece of Russian malware: HAMMERTOSS. It uses some clever techniques to hide: The Hammertoss backdoor malware looks...

Back Doors Won't Solve Comey's Going Dark Problem
From Schneier on Security

Back Doors Won't Solve Comey's Going Dark Problem

At the Aspen Security Forum two weeks ago, James Comey (and others) explicitly talked about the "going dark" problem, describing the specific scenario they are...

Comparing the Security Practices of Experts and Non-Experts
From Schneier on Security

Comparing the Security Practices of Experts and Non-Experts

New paper: "'...no one can hack my mind': Comparing Expert and Non-Expert Security Practices," by Iulia Ion, Rob Reeder, and Sunny Consolvo. Abstract: The state...

The NSA, Metadata, and the Failure of Stopping 9/11
From Schneier on Security

The NSA, Metadata, and the Failure of Stopping 9/11

It's common wisdom that the NSA was unable to intercept phone calls from Khalid al-Mihdhar in San Diego to Bin Ladin in Yemen because of legal restrictions. This...

Fugitive Located by Spotify
From Schneier on Security

Fugitive Located by Spotify

The latest in identification by data: Webber said a tipster had spotted recent activity from Nunn on the Spotify streaming service and alerted law enforcement....

Bizarre High-Tech Kidnapping
From Schneier on Security

Bizarre High-Tech Kidnapping

This is a story of a very high-tech kidnapping: FBI court filings unsealed last week showed how Denise Huskins' kidnappers used anonymous remailers, image sharing...

New RC4 Attack
From Schneier on Security

New RC4 Attack

New research: "All Your Biases Belong To Us: Breaking RC4 in WPA-TKIP and TLS," by Mathy Vanhoef and Frank Piessens: Abstract: We present new biases in RC4, break...

Stagefright Vulnerability in Android Phones
From Schneier on Security

Stagefright Vulnerability in Android Phones

The Stagefright vulnerability for Android phones is a bad one. It's exploitable via a text message (details depend on auto downloading of the particular phone),...

Michael Chertoff Speaks Out Against Backdoors
From Schneier on Security

Michael Chertoff Speaks Out Against Backdoors

This is significant....

Hacking Team's Purchasing of Zero-Day Vulnerabilities
From Schneier on Security

Hacking Team's Purchasing of Zero-Day Vulnerabilities

This is an interesting article that looks at Hacking Team's purchasing of zero-day (0day) vulnerabilities from a variety of sources: Hacking Team's relationships...

Friday Squid Blogging: How a Squid Changes Color
From Schneier on Security

Friday Squid Blogging: How a Squid Changes Color

The California market squid, Doryteuthis opalescens, can manipulate its color in a variety of ways: Reflectins are aptly-named proteins unique to the light-sensing...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account