acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Data and Goliath Makes New York Times Best-Seller List
From Schneier on Security

Data and Goliath Makes New York Times Best-Seller List

The March 22 best-seller list from the New York Times will list me as #6 in the hardcover nonfiction category, and #13 in the combined paper/e-book category. This...

The Changing Economics of Surveillance
From Schneier on Security

The Changing Economics of Surveillance

Cory Doctorow examines the changing economics of surveillance and what it means: The Stasi employed one snitch for every 50 or 60 people it watched. We can't be...

Equation Group Update
From Schneier on Security

Equation Group Update

More information about the Equation Group, aka the NSA. Kaspersky Labs has published more information about the Equation Group -- that's the NSA -- and its sophisticated...

Hardware Bit-Flipping Attack
From Schneier on Security

Hardware Bit-Flipping Attack

The Project Zero team at Google has posted details of a new attack that targets a computer's' DRAM. It's called Rowhammer. Here's a good description: Here's how...

Can the NSA Break Microsoft's BitLocker?
From Schneier on Security

Can the NSA Break Microsoft's BitLocker?

The Intercept has a new story on the CIA's -- yes, the CIA, not the NSA -- efforts to break encryption. These are from the Snowden documents, and talk about a conference...

Geotagging Twitter Users by Mining Their Social Graphs
From Schneier on Security

Geotagging Twitter Users by Mining Their Social Graphs

New research: Geotagging One Hundred Million Twitter Accounts with Total Variation Minimization," by Ryan Compton, David Jurgens, and David Allen. Abstract: Geographically...

Identifying When Someone is Operating a Computer Remotely
From Schneier on Security

Identifying When Someone is Operating a Computer Remotely

Here's an interesting technique to detect Remote Access Trojans, or RATS: differences in how local and remote users use the keyboard and mouse: By using biometric...

Attack Attribution and Cyber Conflict
From Schneier on Security

Attack Attribution and Cyber Conflict

The vigorous debate after the Sony Pictures breach pitted the Obama administration against many of us in the cybersecurity community who didn't buy Washington's...

Friday Squid Blogging: Biodegradable Thermoplastic Inspired by Squid Teeth
From Schneier on Security

Friday Squid Blogging: Biodegradable Thermoplastic Inspired by Squid Teeth

There's a new 3D-printable biodegradable thermoplastic: Pennsylvania State University researchers have synthesized a biodegradable thermoplastic that can be used...

Data and Goliath's Big Idea
From Schneier on Security

Data and Goliath's Big Idea

Data and Goliath is a book about surveillance, both government and corporate. It's an exploration in three parts: what's happening, why it matters, and what to...

FREAK: Security Rollback Attack Against SSL
From Schneier on Security

FREAK: Security Rollback Attack Against SSL

This week we learned about an attack called "FREAK" -- "Factoring Attack on RSA-EXPORT Keys" -- that can break the encryption of many websites. Basically, some...

The TSA's FAST Personality Screening Program Violates the Fourth Amendment
From Schneier on Security

The TSA's FAST Personality Screening Program Violates the Fourth Amendment

New law journal article: "A Slow March Towards Thought Crime: How the Department of Homeland Security's FAST Program Violates the Fourth Amendment," by Christopher...

Now Corporate Drones are Spying on Cell Phones
From Schneier on Security

Now Corporate Drones are Spying on Cell Phones

The marketing firm Adnear is using drones to track cell phone users: The capture does not involve conversations or personally identifiable information, according...

Tom Ridge Can Find Terrorists Anywhere
From Schneier on Security

Tom Ridge Can Find Terrorists Anywhere

One of the problems with our current discourse about terrorism and terrorist policies is that the people entrusted with counterterrorism -- those whose job it is...

Data and Goliath: Reviews and Excerpts
From Schneier on Security

Data and Goliath: Reviews and Excerpts

On the net right now, there are excerpts from the Introduction on Scientific American, Chapter 5 on the Atlantic, Chapter 6 on the Blaze, Chapter 8 on Ars Technica...

Google Backs Away from Default Lollipop Encryption
From Schneier on Security

Google Backs Away from Default Lollipop Encryption

Lillipop encryption by default is still in the future. No conspiracy here; it seems like they don't have the appropriate drivers yet. But while relaxing the requirement...

The Democratization of Cyberattack
From Schneier on Security

The Democratization of Cyberattack

The thing about infrastructure is that everyone uses it. If it's secure, it's secure for everyone. And if it's insecure, it's insecure for everyone. This forces...

Friday Squid Blogging: Humboldt Squid Communicate by Flashing Each Other
From Schneier on Security

Friday Squid Blogging: Humboldt Squid Communicate by Flashing Each Other

Scientists are attaching cameras to Humboldt squid to watch them communicate with each other. As usual, you can also use this squid post to talk about the security...

Data and Goliath Book Tour
From Schneier on Security

Data and Goliath Book Tour

Over the next two weeks, I am speaking about my new book -- Data and Goliath, if you've missed it -- in New York, Boston, Washington, DC, Seattle, San Francisco...

Everyone Wants You To Have Security, But Not from Them
From Schneier on Security

Everyone Wants You To Have Security, But Not from Them

In December, Google's Executive Chairman Eric Schmidt was interviewed at the CATO Institute Surveillance Conference. One of the things he said, after talking about...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account