acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Manipulating Systems Using Remote Lasers
From Schneier on Security

Manipulating Systems Using Remote Lasers

Many systems are vulnerable: Researchers at the time said that they were able to launch inaudible commands by shining lasers — from as far as 360 feet — at the...

Check Washing
From Schneier on Security

Check Washing

I can’t believe that check washing is still a thing: “Check washing” is a practice where thieves break into mailboxes (or otherwise steal mail), find envelopes...

Undermining Democracy
From Schneier on Security

Undermining Democracy

Last Thursday, Rudy Giuliani, a Trump campaign lawyer, alleged a widespread voting conspiracy involving Venezuela, Cuba, and China. Another lawyer, Sidney Powell...

Cyber Public Health
From Schneier on Security

Cyber Public Health

In a lecture, Adam Shostack makes the case for a discipline of cyber public health. It would relate to cybersecurity in a similar way that public health relates...

On That Dusseldorf Hospital Ransomware Attack and the Resultant Death
From Schneier on Security

On That Dusseldorf Hospital Ransomware Attack and the Resultant Death

Wired has a detailed story about the ransomware attack on a Dusseldorf hospital, the one that resulted in an ambulance being redirected to a more distant hospital...

More on the Security of the 2020 US Election
From Schneier on Security

More on the Security of the 2020 US Election

Last week I signed on to two joint letters about the security of the 2020 election. The first was as one of 59 election security experts, basically saying that...

Indistinguishability Obfuscation
From Schneier on Security

Indistinguishability Obfuscation

Quanta magazine recently published a breathless article on indistinguishability obfuscation — calling it the “‘crown jewel’ of cryptography” — and saying that it...

Symantec Reports on Cicada APT Attacks against Japan
From Schneier on Security

Symantec Reports on Cicada APT Attacks against Japan

Symantec is reporting on an APT group linked to China, named Cicada. They have been attacking organizations in Japan and elsewhere. Cicada has historically been...

The US Military Buys Commercial Location Data
From Schneier on Security

The US Military Buys Commercial Location Data

Vice has a long article about how the US military buys commercial location data worldwide. The U.S. military is buying the granular movement data of people around...

Michael Ellis as NSA General Counsel
From Schneier on Security

Michael Ellis as NSA General Counsel

Over at Lawfare, Susan Hennessey has an excellent primer on how Trump loyalist Michael Ellis got to be the NSA General Counsel, over the objections of NSA Director...

On Blockchain Voting
From Schneier on Security

On Blockchain Voting

Blockchain voting is a spectacularly dumb idea for a whole bunch of reasons. I have generally quoted Matt Blaze: Why is blockchain voting a dumb idea? Glad you...

Friday Squid Blogging: Bigfin Squid Found in Australian Waters
From Schneier on Security

Friday Squid Blogging: Bigfin Squid Found in Australian Waters

A bigfin squid has been found — and filmed — in Australian waters for the first time. As usual, you can also use this squid post to talk about the security stories...

Inrupt’s Solid Announcement
From Schneier on Security

Inrupt’s Solid Announcement

Earlier this year, I announced that I had joined Inrupt, the company commercializing Tim Berners-Lee’s Solid specification: The idea behind Solid is both simple...

Friday Squid Blogging: Diplomoceras Maximum
From Schneier on Security

Friday Squid Blogging: Diplomoceras Maximum

Diplomoceras maximum is an ancient squid-like creature. It lived about 68 million years ago, looked kind of like a giant paperclip, and may have had a lifespanhere...

Upcoming Speaking Engagements
From Schneier on Security

Upcoming Speaking Engagements

This is a current list of where and when I am scheduled to speak: I’m speaking at the (ISC)² Security Congress 2020, November 16, 2020. I’ll be on a panel at the...

“Privacy Nutrition Labels” in Apple’s App Store
From Schneier on Security

“Privacy Nutrition Labels” in Apple’s App Store

Apple will start requiring standardized privacy labels for apps in its app store, starting in December: Apple allows data disclosure to be optional if all of the...

New Zealand Election Fraud
From Schneier on Security

New Zealand Election Fraud

It seems that this election season has not gone without fraud. In New Zealand, a vote for “Bird of the Year” has been marred by fraudulent votes: More than 1,500...

The Security Failures of Online Exam Proctoring
From Schneier on Security

The Security Failures of Online Exam Proctoring

Proctoring an online exam is hard. It’s hard to be sure that the student isn’t cheating, maybe by having reference materials at hand, or maybe by substituting someone...

2020 Was a Secure Election
From Schneier on Security

2020 Was a Secure Election

Over at Lawfare: “2020 Is An Election Security Success Story (So Far).” What’s more, the voting itself was remarkably smooth. It was only a few months ago that...

Detecting Phishing Emails
From Schneier on Security

Detecting Phishing Emails

Research paper: Rick Wash, “How Experts Detect Phishing Scam Emails“: Abstract: Phishing scam emails are emails that pretend to be something they are not in order...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account