acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

NSA Has Undercover Operatives in Foreign Companies
From Schneier on Security

NSA Has Undercover Operatives in Foreign Companies

The latest Intercept article on the Snowden NSA documents talks about their undercover operatives working in foreign companies. There are no specifics, although...

Friday Squid Blogging: Flash-Fried Squid Recipe
From Schneier on Security

Friday Squid Blogging: Flash-Fried Squid Recipe

Recipe from Tom Douglas. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Online Activism and the Computer Fraud and Abuse Act
From Schneier on Security

Online Activism and the Computer Fraud and Abuse Act

Good essay by Molly Sauter: basically, there is no legal avenue for activism and protest on the Internet. Also note Sauter's new book, The Coming Swarm....

Dynamic Encryption for Voice
From Schneier on Security

Dynamic Encryption for Voice

This article reads like snake oil. But the company was founded by Lars Knudsen, so it can't possibly be. I'm curious....

USB Cufflinks
From Schneier on Security

USB Cufflinks

Just the thing for smuggling data out of secure locations....

BadUSB Code Has Been Published
From Schneier on Security

BadUSB Code Has Been Published

In July, I wrote about an unpatchable USB vulnerability called BadUSB. Code for the vulnerability has been published....

Data and Goliath Is Finished
From Schneier on Security

Data and Goliath Is Finished

Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World is finished. I submitted it to my publisher, Norton, this morning. In a few weeks...

iPhone Encryption and the Return of the Crypto Wars
From Schneier on Security

iPhone Encryption and the Return of the Crypto Wars

Last week Apple announced that it is closing a serious security vulnerability in the iPhone. It used to be that the phone's encryption only protected a small amount...

Friday Squid Blogging: Squid Burger
From Schneier on Security

Friday Squid Blogging: Squid Burger

McDonald's has a Halloween-themed burger with a squid-ink bun. Only in Japan. As usual, you can also use this squid post to talk about the security stories in the...

William Binney Explains NSA Surveillance Using Snowden's Documents
From Schneier on Security

William Binney Explains NSA Surveillance Using Snowden's Documents

Former NSA employee -- not technical director, as the link says -- explains how NSA bulk surveillance works, using some of the Snowden documents. Very interesting...

The NSA's Private Cloud
From Schneier on Security

The NSA's Private Cloud

The NSA is building a private cloud with its own security features: As a result, the agency can now track every instance of every individual accessing what is in...

Firechat
From Schneier on Security

Firechat

Firechat is a secure wireless peer-to-peer chat app: Firechat is theoretically resistant to the kind of centralized surveillance that the Chinese government (as...

Security Theater in China
From Schneier on Security

Security Theater in China

The Chinese government checked ten thousand pigeons for "dangerous materials." Because fear....

NSA Patents Available for License
From Schneier on Security

NSA Patents Available for License

There's a new article on NSA's Technology Transfer Program, a 1990s-era program to license NSA patents to private industry. I was pretty dismissive about the offerings...

Friday Squid Blogging: Squid Fishing Moves North in California
From Schneier on Security

Friday Squid Blogging: Squid Fishing Moves North in California

Warmer waters are moving squid fishing up the California coast. As usual, you can also use this squid post to talk about the security stories in the news that I...

Medical Records Theft and Fraud
From Schneier on Security

Medical Records Theft and Fraud

There's a Reuters article on new types of fraud using stolen medical records. I don't know how much of this is real and how much is hype, but I'm certain that criminals...

Security Trade-offs of Cloud Backup
From Schneier on Security

Security Trade-offs of Cloud Backup

This is a good essay on the security trade-offs with cloud backup: iCloud backups have not eliminated this problem, but they have made it far less common. This...

Nasty Vulnerability found in Bash
From Schneier on Security

Nasty Vulnerability found in Bash

It's a big and nasty one. Invariably we're going to see articles pointing at this and at Heartbleed and claim a trend in vulnerabilities in open-source software...

Julian Sanchez on the NSA and Surveillance Reform
From Schneier on Security

Julian Sanchez on the NSA and Surveillance Reform

Julian Sanchez of the Cato Institute has a lengthy audio interview on NSA surveillance and reform. Worth listening to....

Detecting Robot-Handwriting
From Schneier on Security

Detecting Robot-Handwriting

Interesting article on the arms race between creating robot "handwriting" that looks human, and detecting text that has been written by a robot. Robots will continue...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account