acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Identity Theft on the Job Market
From Schneier on Security

Identity Theft on the Job Market

Identity theft is getting more subtle: "My job application was withdrawn by someone pretending to be me": When Mr Fearn applied for a job at the company he didn't...

Zoom Vulnerability
From Schneier on Security

Zoom Vulnerability

The Zoom conferencing app has a vulnerability that allows someone to remotely take over the computer's camera. It's a bad vulnerability, made worse by the fact...

Palantir's Surveillance Service for Law Enforcement
From Schneier on Security

Palantir's Surveillance Service for Law Enforcement

Motherboard got its hands on Palantir's Gotham user's manual, which is used by the police to get information on people: The Palantir user guide shows that police...

Upcoming Speaking Engagements
From Schneier on Security

Upcoming Speaking Engagements

This is a current list of where and when I am scheduled to speak: I'm speaking at Black Hat USA 2019 in Las Vegas on Wednesday, August 7 and Thurdsay, August 8,...

Friday Squid Blogging: When the Octopus and Squid Lost Their Shells
From Schneier on Security

Friday Squid Blogging: When the Octopus and Squid Lost Their Shells

Cephalopod ancestors once had shells. When did they lose them? With the molecular clock technique, which allowed him to use DNA to map out the evolutionary history...

Clickable Endnotes to Click Here to Kill Everybody
From Schneier on Security

Clickable Endnotes to Click Here to Kill Everybody

In Click Here to Kill Everybody, I promised clickable endnotes. They're finally available....

Presidential Candidate Andrew Yang Has Quantum Encryption Policy
From Schneier on Security

Presidential Candidate Andrew Yang Has Quantum Encryption Policy

At least one presidential candidate has a policy about quantum computing and encryption. It has two basic planks. One: fund quantum-resistant encryption standards...

Resetting Your GE Smart Light Bulb
From Schneier on Security

Resetting Your GE Smart Light Bulb

If you need to reset the software in your GE smart light bulb -- firmware version 2.8 or later -- just follow these easy instructions: Start with your bulb off...

Details of the Cloud Hopper Attacks
From Schneier on Security

Details of the Cloud Hopper Attacks

Reuters has a long article on the Chinese government APT attack called Cloud Hopper. It was much bigger than originally reported. The hacking campaign, known as...

Cell Networks Hacked by (Probable) Nation-State Attackers
From Schneier on Security

Cell Networks Hacked by (Probable) Nation-State Attackers

A sophisticated attacker has successfuly infiltrated cell providers to collect information on specific users: The hackers have systematically broken in to more...

Cardiac Biometric
From Schneier on Security

Cardiac Biometric

MIT Technology Review is reporting about an infrared laser device that can identify people by their unique cardiac signature at a distance: A new device, developed...

Ransomware Recovery Firms Who Secretly Pay Hackers
From Schneier on Security

Ransomware Recovery Firms Who Secretly Pay Hackers

ProPublica is reporting on companies that pretend to recover data locked up by ransomware, but just secretly pay the hackers and then mark up the cost to the victims...

Friday Squid Blogging: Squid Cars
From Schneier on Security

Friday Squid Blogging: Squid Cars

Jalopnik asks the important question: "If squids ruled the earth, what would their cars be like?" As usual, you can also use this squid post to talk about the security...

Applied Cryptography is Banned in Oregon Prisons
From Schneier on Security

Applied Cryptography is Banned in Oregon Prisons

My Applied Cryptography is on a list of books banned in Oregon prisons. It's not me -- and it's not cryptography -- it's that the prisons ban books that teach people...

Research on Human Honesty
From Schneier on Security

Research on Human Honesty

New research from Science: "Civic honesty around the globe": Abstract: Civic honesty is essential to social capital and economic development, but is often in conflict...

US Journalist Detained When Returning to US
From Schneier on Security

US Journalist Detained When Returning to US

Pretty horrible story of a US journalist who had his computer and phone searched at the border when returning to the US from Mexico. After I gave him the password...

Digital License Plates
From Schneier on Security

Digital License Plates

They're a thing: Developers say digital plates utilize "advanced telematics" -- to collect tolls, pay for parking and send out Amber Alerts when a child is abducted...

Google Releases Basic Homomorphic Encryption Tool
From Schneier on Security

Google Releases Basic Homomorphic Encryption Tool

Google has released an open-source cryptographic tool: Private Join and Compute. From a Wired article: Private Join and Compute uses a 1970s methodology known as...

Yubico Security Keys with a Crypto Flaw
From Schneier on Security

Yubico Security Keys with a Crypto Flaw

Wow, is this an embarrassing bug: Yubico is recalling a line of security keys used by the U.S. government due to a firmware flaw. The company issued a security...

Friday Squid Blogging: Fantastic Video of a Juvenile Giant Squid
From Schneier on Security

Friday Squid Blogging: Fantastic Video of a Juvenile Giant Squid

It's amazing: Then, about 20 hours into the recording from the Medusa's fifth deployment, Dr. Robinson saw the sharp points of tentacles sneaking into the camera's...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account