acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Security of Password Managers
From Schneier on Security

Security of Password Managers

At USENIX Security this year there were two papers studying the security of password managers: David Silver, Suman Jana, and Dan Boneh, "Password Managers: Attacks...

JackPair Encrypted Phone Add-On
From Schneier on Security

JackPair Encrypted Phone Add-On

JackPair is a clever device encrypts your voice between your headset and the audio jack. The crypto looks competent, and the design looks well-thought-out. I'd...

Electromagnetic Weapons
From Schneier on Security

Electromagnetic Weapons

Long article in IEEE Spectrum....

Pencil-and-Paper Codes Used by Central American Criminal Gangs
From Schneier on Security

Pencil-and-Paper Codes Used by Central American Criminal Gangs

No mention of how good the codes are. My guess is not very....

Squid Skin Inspires Eye-Like Photodetector
From Schneier on Security

Squid Skin Inspires Eye-Like Photodetector

Squid are color-blind, but may detect color directly through their skin. A researcher is working on a system to detect colored light the way squid do....

Cell Phone Kill Switches Mandatory in California
From Schneier on Security

Cell Phone Kill Switches Mandatory in California

California passed a kill-switch law, meaning that all cell phones sold in California must have the capability to be remotely turned off. It was sold as an antitheft...

ISIS Threatens US with Terrorism
From Schneier on Security

ISIS Threatens US with Terrorism

They're openly mocking our profiling. But in several telephone conversations with a Reuters reporter over the past few months, Islamic State fighters had indicated...

Hacking Traffic Lights
From Schneier on Security

Hacking Traffic Lights

New paper: "Green Lights Forever: Analyzing the Security of Traffic Infrastructure," Branden Ghena, William Beyer, Allen Hillaker, Jonathan Pevarnek, and J. Alex...

Security Flaws in Rapiscan Full-Body Scanners
From Schneier on Security

Security Flaws in Rapiscan Full-Body Scanners

Security researchers have finally gotten their hands on a Rapiscan backscatter full-body scanner. The results aren't very good. Website with paper and images. News...

Security by Obscurity at Healthcare.gov Site
From Schneier on Security

Security by Obscurity at Healthcare.gov Site

The White House is refusing to release details about the security of healthcare.gov because it might help hackers. What this really means is that the security details...

Eavesdropping Using Smart Phone Gyroscopes
From Schneier on Security

Eavesdropping Using Smart Phone Gyroscopes

The gyroscopes are sensitive enough to pick up acoustic vibrations. It's crude, but it works. Paper. Wired article. Hacker News thread....

The Problems with PGP
From Schneier on Security

The Problems with PGP

Matthew Green has a good post on what's wrong with PGP and what should be done about it....

People Are Not Very Good at Matching Photographs to People
From Schneier on Security

People Are Not Very Good at Matching Photographs to People

We have an error rate of about 15%: Professor Mike Burton, Sixth Century Chair in Psychology at the University of Aberdeen said: "Psychologists identified around...

Friday Squid Blogging: Squid Boats Illuminate Bangkok from Space
From Schneier on Security

Friday Squid Blogging: Squid Boats Illuminate Bangkok from Space

Really: To attract the phytoplankton, fishermen suspend green lights from their boats to illuminate the sea. When the squid chase after their dinner, they're drawn...

Chapter 137 of My Surreal Life
From Schneier on Security

Chapter 137 of My Surreal Life

Someone wrote Sherlock-Schneier fan fiction. Not slash, thank heavens. (And no, that's not an invitation.)...

The Onion on Passwords
From Schneier on Security

The Onion on Passwords

Funny....

Disguising Exfiltrated Data
From Schneier on Security

Disguising Exfiltrated Data

There's an interesting article on a data exfiltration technique. What was unique about the attackers was how they disguised traffic between the malware and command...

The Security of al Qaeda Encryption Software
From Schneier on Security

The Security of al Qaeda Encryption Software

The web intelligence firm Recorded Future has posted two stories about how al Qaeda is using new encryption software in response to the Snowden disclosures. NPR...

US Air Force is Focusing on Cyber Deception
From Schneier on Security

US Air Force is Focusing on Cyber Deception

The US Air Force is focusing on cyber deception next year: Background: Deception is a deliberate act to conceal activity on our networks, create uncertainty and...

QUANTUM Technology Sold by Cyberweapons Arms Manufacturers
From Schneier on Security

QUANTUM Technology Sold by Cyberweapons Arms Manufacturers

Last October, I broke the story about the NSA's top secret program to inject packets into the Internet backbone: QUANTUM. Specifically, I wrote about how QUANTUMINSERT...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account