acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

How the CIA Might Target Apple's XCode
From Schneier on Security

How the CIA Might Target Apple's XCode

The Intercept recently posted a story on the CIA's attempts to hack the iOS operating system. Most interesting was the speculation that it hacked XCode, which would...

Threats to Information Integrity
From Schneier on Security

Threats to Information Integrity

Every year, the Director of National Intelligence publishes an unclassified "Worldwide Threat Assessment." This year's report was published two weeks ago. "Cyber"...

Details on Hacking Team Software Used by Ethiopian Government
From Schneier on Security

Details on Hacking Team Software Used by Ethiopian Government

The Citizen Lab at the University of Toronto published a new report on the use of spyware from the Italian cyberweapons arms manufacturer Hacking Team by the Ethiopian...

Fall Seminar on Catastrophic Risk
From Schneier on Security

Fall Seminar on Catastrophic Risk

I am planning a study group at Harvard University (in Boston) for the Fall semester, on catastrophic risk. Berkman Study Group -- Catastrophic Risk: Technologies...

Data and Goliath Makes New York Times Best-Seller List
From Schneier on Security

Data and Goliath Makes New York Times Best-Seller List

The March 22 best-seller list from the New York Times will list me as #6 in the hardcover nonfiction category, and #13 in the combined paper/e-book category. This...

The Changing Economics of Surveillance
From Schneier on Security

The Changing Economics of Surveillance

Cory Doctorow examines the changing economics of surveillance and what it means: The Stasi employed one snitch for every 50 or 60 people it watched. We can't be...

Equation Group Update
From Schneier on Security

Equation Group Update

More information about the Equation Group, aka the NSA. Kaspersky Labs has published more information about the Equation Group -- that's the NSA -- and its sophisticated...

Hardware Bit-Flipping Attack
From Schneier on Security

Hardware Bit-Flipping Attack

The Project Zero team at Google has posted details of a new attack that targets a computer's' DRAM. It's called Rowhammer. Here's a good description: Here's how...

Can the NSA Break Microsoft's BitLocker?
From Schneier on Security

Can the NSA Break Microsoft's BitLocker?

The Intercept has a new story on the CIA's -- yes, the CIA, not the NSA -- efforts to break encryption. These are from the Snowden documents, and talk about a conference...

Geotagging Twitter Users by Mining Their Social Graphs
From Schneier on Security

Geotagging Twitter Users by Mining Their Social Graphs

New research: Geotagging One Hundred Million Twitter Accounts with Total Variation Minimization," by Ryan Compton, David Jurgens, and David Allen. Abstract: Geographically...

Identifying When Someone is Operating a Computer Remotely
From Schneier on Security

Identifying When Someone is Operating a Computer Remotely

Here's an interesting technique to detect Remote Access Trojans, or RATS: differences in how local and remote users use the keyboard and mouse: By using biometric...

Attack Attribution and Cyber Conflict
From Schneier on Security

Attack Attribution and Cyber Conflict

The vigorous debate after the Sony Pictures breach pitted the Obama administration against many of us in the cybersecurity community who didn't buy Washington's...

Friday Squid Blogging: Biodegradable Thermoplastic Inspired by Squid Teeth
From Schneier on Security

Friday Squid Blogging: Biodegradable Thermoplastic Inspired by Squid Teeth

There's a new 3D-printable biodegradable thermoplastic: Pennsylvania State University researchers have synthesized a biodegradable thermoplastic that can be used...

Data and Goliath's Big Idea
From Schneier on Security

Data and Goliath's Big Idea

Data and Goliath is a book about surveillance, both government and corporate. It's an exploration in three parts: what's happening, why it matters, and what to...

FREAK: Security Rollback Attack Against SSL
From Schneier on Security

FREAK: Security Rollback Attack Against SSL

This week we learned about an attack called "FREAK" -- "Factoring Attack on RSA-EXPORT Keys" -- that can break the encryption of many websites. Basically, some...

The TSA's FAST Personality Screening Program Violates the Fourth Amendment
From Schneier on Security

The TSA's FAST Personality Screening Program Violates the Fourth Amendment

New law journal article: "A Slow March Towards Thought Crime: How the Department of Homeland Security's FAST Program Violates the Fourth Amendment," by Christopher...

Now Corporate Drones are Spying on Cell Phones
From Schneier on Security

Now Corporate Drones are Spying on Cell Phones

The marketing firm Adnear is using drones to track cell phone users: The capture does not involve conversations or personally identifiable information, according...

Tom Ridge Can Find Terrorists Anywhere
From Schneier on Security

Tom Ridge Can Find Terrorists Anywhere

One of the problems with our current discourse about terrorism and terrorist policies is that the people entrusted with counterterrorism -- those whose job it is...

Data and Goliath: Reviews and Excerpts
From Schneier on Security

Data and Goliath: Reviews and Excerpts

On the net right now, there are excerpts from the Introduction on Scientific American, Chapter 5 on the Atlantic, Chapter 6 on the Blaze, Chapter 8 on Ars Technica...

Google Backs Away from Default Lollipop Encryption
From Schneier on Security

Google Backs Away from Default Lollipop Encryption

Lillipop encryption by default is still in the future. No conspiracy here; it seems like they don't have the appropriate drivers yet. But while relaxing the requirement...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account