acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

A Feminist Take on Information Privacy
From Schneier on Security

A Feminist Take on Information Privacy

Maria Farrell has a really interesting framing of information/device privacy: What our smartphones and relationship abusers share is that they both exert power...

France Outlines Its Approach to Cyberwar
From Schneier on Security

France Outlines Its Approach to Cyberwar

In a document published earlier this month (in French), France described the legal framework in which it will conduct cyberwar operations. Lukasz Olejnik explains...

Friday Squid Blogging: Piglet Squid
From Schneier on Security

Friday Squid Blogging: Piglet Squid

Another piglet squid video. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting...

Crown Sterling Claims to Factor RSA Keylengths First Factored Twenty Years Ago
From Schneier on Security

Crown Sterling Claims to Factor RSA Keylengths First Factored Twenty Years Ago

Earlier this month I made fun of a company called Crown-Sterling, for...for...for being a company that deserves being made fun of. This morning, the company announced...

New Biometrics
From Schneier on Security

New Biometrics

This article discusses new types of biometrics under development, including gait, scent, heartbeat, microbiome, and butt shape (no, really)....

Revisiting Software Vulnerabilities in the Boeing 787
From Schneier on Security

Revisiting Software Vulnerabilities in the Boeing 787

I previously blogged about a Black Hat talk that disclosed security vulnerabilities in the Boeing 787 software. Ben Rothke concludes that the vulnerabilities are...

I'm Looking to Hire a Strategist to Help Figure Out Public-Interest Tech
From Schneier on Security

I'm Looking to Hire a Strategist to Help Figure Out Public-Interest Tech

I am in search of a strategic thought partner: a person who can work closely with me over the next 9 to 12 months in assessing what's needed to advance the practice...

Cracking Forgotten Passwords
From Schneier on Security

Cracking Forgotten Passwords

Expandpass is a string expansion program. It's "useful for cracking passwords you kinda-remember." You tell the program what you remember about the password and...

Another Side Channel in Intel Chips
From Schneier on Security

Another Side Channel in Intel Chips

Not that serious, but interesting: In late 2011, Intel introduced a performance enhancement to its line of server processors that allowed network cards and other...

Upcoming Speaking Engagements
From Schneier on Security

Upcoming Speaking Engagements

This is a current list of where and when I am scheduled to speak: I'm speaking at University College London on September 23, 2019. I'm speaking at World's Top 50...

Friday Squid Blogging: How Scientists Captured the Giant Squid Video
From Schneier on Security

Friday Squid Blogging: How Scientists Captured the Giant Squid Video

In June, I blogged about a video of a live juvenile giant squid. Here's how that video was captured. As usual, you can also use this squid post to talk about the...

When Biology Becomes Software
From Schneier on Security

When Biology Becomes Software

All of life is based on the coordinated action of genetic parts (genes and their controlling sequences) found in the genomes (the complete DNA sequence) of organisms...

Smart Watches and Cheating on Tests
From Schneier on Security

Smart Watches and Cheating on Tests

The Independent Commission on Examination Malpractice in the UK has recommended that all watches be banned from exam rooms, basically because it's becoming very...

Fabricated Voice Used in Financial Fraud
From Schneier on Security

Fabricated Voice Used in Financial Fraud

This seems to be an identity theft first: Criminals used artificial intelligence-based software to impersonate a chief executive's voice and demand a fraudulent...

More on Law Enforcement Backdoor Demands
From Schneier on Security

More on Law Enforcement Backdoor Demands

The Carnegie Endowment for International Peace and Princeton University's Center for Information Technology Policy convened an Encryption Working Group to attempt...

On Cybersecurity Insurance
From Schneier on Security

On Cybersecurity Insurance

Good paper on cybersecurity insurance: both the history and the promise for the future. From the conclusion: Policy makers have long held high hopes for cyber insurance...

NotPetya
From Schneier on Security

NotPetya

Wired has a long article on NotPetya....

Friday Squid Blogging: Squid Perfume
From Schneier on Security

Friday Squid Blogging: Squid Perfume

It's not perfume for squids. Nor is it perfume made from squids. It's a perfume called Squid, "inspired by life in the sea." As usual, you can also use this squid...

Default Password for GPS Trackers
From Schneier on Security

Default Password for GPS Trackers

Many GPS trackers are shipped with the default password 123456. Many users don't change them. We just need to eliminate default passwords. This is an easy win.....

The Doghouse: Crown Sterling
From Schneier on Security

The Doghouse: Crown Sterling

A decade ago, the Doghouse was a regular feature in both my email newsletter Crypto-Gram and my blog. In it, I would call out particularly egregious -- and amusing...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account