acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

How the Internet Affects National Sovereignty
From Schneier on Security

How the Internet Affects National Sovereignty

Interesting paper by Melissa Hathaway: "Connected Choices: How the Internet Is Challenging Sovereign Decisions." Abstract: Modern societies are in the middle of...

Verizon Tracking Mobile Internet Use
From Schneier on Security

Verizon Tracking Mobile Internet Use

Verizon is tracking the Internet use of their phones by surreptitiously modifying URLs. This is a good description of how it works....

Adam Shostack's Threat Modeling
From Schneier on Security

Adam Shostack's Threat Modeling

Probably the best IT security book of the year is Adam Shostack's Threat Modeling. The book is an honorable mention finalist for "The Best Books" of the past 12...

Friday Squid Blogging: Little Squid
From Schneier on Security

Friday Squid Blogging: Little Squid

Beautiful photo. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Hacking Team Documentation
From Schneier on Security

Hacking Team Documentation

The Intercept has published the complete manuals for Hacking Team's attack software. This follows a detailed report on Hacking Team's products from August. Hacking...

Enigma Simulator
From Schneier on Security

Enigma Simulator

Good article, with pictures, diagrams, and code....

The Risk of Unfounded Ebola Fears
From Schneier on Security

The Risk of Unfounded Ebola Fears

Good essay. Worry about Ebola (or anything) manifests physically as what's known as a fight, flight, or freeze response. Biological systems ramp up or down to focus...

Adobe Book Reader Surveillance
From Schneier on Security

Adobe Book Reader Surveillance

Details. Confirmation....

FDA Guidance on Medical Device Cybersecurity
From Schneier on Security

FDA Guidance on Medical Device Cybersecurity

The Food and Drug Administration has released guidelines regarding the security of medical devices. I admit that I have not read it....

Survey on What Americans Fear
From Schneier on Security

Survey on What Americans Fear

Interesting data: Turning to the crime section of the Chapman Survey on American Fears, the team discovered findings that not only surprised them, but also those...

Apple Copies Your Files Without Your Knowledge or Consent
From Schneier on Security

Apple Copies Your Files Without Your Knowledge or Consent

The latest version of Apple's OS automatically syncs your files to iCloud Drive, even files you choose to store locally. Apple encrypts your data, both in transit...

US Intelligence "Second Leaker" Identified
From Schneier on Security

US Intelligence "Second Leaker" Identified

There's a report that the FBI has identified a second leaker: The case in question involves an Aug. 5 story published by The Intercept, an investigative website...

Authentication Attack Against Credit Card Verification
From Schneier on Security

Authentication Attack Against Credit Card Verification

Here's a physical attack against a credit card verification system. Basically, the attack disrupts the communications between the retail terminal and the system...

Spritz: A New RC4-Like Stream Cipher
From Schneier on Security

Spritz: A New RC4-Like Stream Cipher

Last week, Ron Rivest gave a talk at MIT about Spritz, a new stream cipher by him and Jacob Schuldt. It's basically a redesign of RC4, given current cryptographic...

Friday Squid Blogging: Humboldt Squids Attack Submarine
From Schneier on Security

Friday Squid Blogging: Humboldt Squids Attack Submarine

A pair of Humboldt squids attacked a Greenpeace submarine. There's video. As usual, you can also use this squid post to talk about the security stories in the news...

The Ineffectiveness of Sealing the Border Against Ebola (and Other Viruses)
From Schneier on Security

The Ineffectiveness of Sealing the Border Against Ebola (and Other Viruses)

Good analysis....

Analysis of Printer Watermarking Techniques
From Schneier on Security

Analysis of Printer Watermarking Techniques

Interesting paper: Maya Embar, Louis M. McHough IV, and William R. Wesselman, "Printer watermark obfuscation," Proceeding RIIT '14: Proceedings of the 3rd annual...

The NSA's Role in Commercial Cybersecurity
From Schneier on Security

The NSA's Role in Commercial Cybersecurity

Susan Landau has a new paper on the NSA's increasing role in commercial cybersecurity. She argues that the NSA is the wrong organization to do this, and we need...

Jumping Air Gaps with All-in-One Printers
From Schneier on Security

Jumping Air Gaps with All-in-One Printers

Last week, Adi Shamir gave a presentation at Black Hat Europe on using all-in-one printers to control computers on the other side of air gaps. There's no paper...

Deanonymizing Taxi Passenger and Fare Data
From Schneier on Security

Deanonymizing Taxi Passenger and Fare Data

Interesting essay on the sorts of things you can learn from anonymized taxi passenger and fare data....
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account