acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Work-from-Home Security Advice
From Schneier on Security

Work-from-Home Security Advice

SANS has made freely available its "Work-from-Home Awareness Kit." When I think about how COVID-19's security measures are affecting organizational networks, I...

The Insecurity of WordPress and Apache Struts
From Schneier on Security

The Insecurity of WordPress and Apache Struts

Interesting data: A study that analyzed all the vulnerability disclosures between 2010 and 2019 found that around 55% of all the security bugs that have been weaponized...

TSA Admits Liquid Ban Is Security Theater
From Schneier on Security

TSA Admits Liquid Ban Is Security Theater

The TSA is allowing people to bring larger bottles of hand sanitizer with them on airplanes: Passengers will now be allowed to travel with containers of liquid...

Friday Squid Blogging: New Report on Squid Markets
From Schneier on Security

Friday Squid Blogging: New Report on Squid Markets

This report costs $2,000. (Please don't buy it for me.) As usual, you can also use this squid post to talk about the security stories in the news that I haven't...

The EARN-IT Act
From Schneier on Security

The EARN-IT Act

Prepare for another attack on encryption in the U.S. The EARN-IT Act purports to be about protecting children from predation, but it's really about forcing the...

The Whisper Secret-Sharing App Exposed Locations
From Schneier on Security

The Whisper Secret-Sharing App Exposed Locations

This is a big deal: Whisper, the secret-sharing app that called itself the "safest place on the Internet," left years of users' most intimate confessions exposed...

LA Covers Up Bad Cybersecurity
From Schneier on Security

LA Covers Up Bad Cybersecurity

This is bad in several dimensions. The Los Angeles Department of Water and Power has been accused of deliberately keeping widespread gaps in its cybersecurity a...

CIA Dirty Laundry Aired
From Schneier on Security

CIA Dirty Laundry Aired

Joshua Schulte, the CIA employee standing trial for leaking the Wikileaks Vault 7 CIA hacking tools, maintains his innocence. And during the trial, a lot of shoddy...

Cybersecurity Law Casebook
From Schneier on Security

Cybersecurity Law Casebook

Robert Chesney teaches cybersecurity at the University of Texas School of Law. He recently published a fantastic casebook, which is a good source for anyone studying...

Friday Squid Blogging: The Effect of Noise on Squid
From Schneier on Security

Friday Squid Blogging: The Effect of Noise on Squid

Two articles. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines...

More on Crypto AG
From Schneier on Security

More on Crypto AG

One follow-on to the story of Crypto AG being owned by the CIA: this interview with a Washington Post reporter. The whole thing is worth reading or listening to...

Security of Health Information
From Schneier on Security

Security of Health Information

The world is racing to contain the new COVID-19 virus that is spreading around the globe with alarming speed. Right now, pandemic disease experts at the World Health...

Let's Encrypt Vulnerability
From Schneier on Security

Let's Encrypt Vulnerability

The BBC is reporting a vulnerability in the Let's Encrypt certificate service: In a notification email to its clients, the organisation said: "We recently discovered...

Wi-Fi Chip Vulnerability
From Schneier on Security

Wi-Fi Chip Vulnerability

There's a vulnerability in Wi-Fi hardware that breaks the encryption: The vulnerability exists in Wi-Fi chips made by Cypress Semiconductor and Broadcom, the latter...

Facebook's Download-Your-Data Tool Is Incomplete
From Schneier on Security

Facebook's Download-Your-Data Tool Is Incomplete

Privacy International has the details: Key facts: Despite Facebook claim, "Download Your Information" doesn't provide users with a list of all advertisers who uploaded...

Friday Squid Blogging: Squid Eggs
From Schneier on Security

Friday Squid Blogging: Squid Eggs

Cool photo. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here...

Humble Bundle's 2020 Cybersecurity Books
From Schneier on Security

Humble Bundle's 2020 Cybersecurity Books

For years, Humble Bundle has been selling great books at a "pay what you can afford" model. This month, they're featuring as many as nineteen cybersecurity books...

Deep Learning to Find Malicious Email Attachments
From Schneier on Security

Deep Learning to Find Malicious Email Attachments

Google presented its system of using deep-learning techniques to identify malicious email attachments: At the RSA security conference in San Francisco on Tuesday...

Securing the Internet of Things through Class-Action Lawsuits
From Schneier on Security

Securing the Internet of Things through Class-Action Lawsuits

This law journal article discusses the role of class-action litigation to secure the Internet of Things. Basically, the article postulates that (1) market realities...

Newly Declassified Study Demonstrates Uselessness of NSA's Phone Metadata Program
From Schneier on Security

Newly Declassified Study Demonstrates Uselessness of NSA's Phone Metadata Program

The New York Times is reporting on the NSA's phone metadata program, which the NSA shut down last year: A National Security Agency system that analyzed logs of...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account