acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Digital License Plates
From Schneier on Security

Digital License Plates

They're a thing: Developers say digital plates utilize "advanced telematics" -- to collect tolls, pay for parking and send out Amber Alerts when a child is abducted...

Google Releases Basic Homomorphic Encryption Tool
From Schneier on Security

Google Releases Basic Homomorphic Encryption Tool

Google has released an open-source cryptographic tool: Private Join and Compute. From a Wired article: Private Join and Compute uses a 1970s methodology known as...

Yubico Security Keys with a Crypto Flaw
From Schneier on Security

Yubico Security Keys with a Crypto Flaw

Wow, is this an embarrassing bug: Yubico is recalling a line of security keys used by the U.S. government due to a firmware flaw. The company issued a security...

Friday Squid Blogging: Fantastic Video of a Juvenile Giant Squid
From Schneier on Security

Friday Squid Blogging: Fantastic Video of a Juvenile Giant Squid

It's amazing: Then, about 20 hours into the recording from the Medusa's fifth deployment, Dr. Robinson saw the sharp points of tentacles sneaking into the camera's...

I'm Leaving IBM
From Schneier on Security

I'm Leaving IBM

Today is my last day at IBM. If you've been following along, IBM bought my startup Resilient Systems in Spring 2016. Since then, I have been with IBM, holding the...

Cellebrite Claims It Can Unlock Any iPhone
From Schneier on Security

Cellebrite Claims It Can Unlock Any iPhone

The digital forensics company Cellebrite now claims it can unlock any iPhone. I dithered before blogging this, not wanting to give the company more publicity. But...

Spanish Soccer League App Spies on Fans
From Schneier on Security

Spanish Soccer League App Spies on Fans

The Spanish Soccer League's smartphone app spies on fans in order to find bars that are illegally streaming its games. The app listens with the microphone for the...

MongoDB Offers Field Level Encryption
From Schneier on Security

MongoDB Offers Field Level Encryption

MongoDB now has the ability to encrypt data by field: MongoDB calls the new feature Field Level Encryption. It works kind of like end-to-end encrypted messaging...

Person in Latex Mask Impersonated French Minister
From Schneier on Security

Person in Latex Mask Impersonated French Minister

Forget deep fakes. Someone wearing a latex mask fooled people on video calls for a period of two years, successfully scamming 80 million euros from rich French...

Florida City Pays Ransomware
From Schneier on Security

Florida City Pays Ransomware

Learning from the huge expenses Atlanta and Baltimore incurred by refusing to pay ransomware, the Florida City of Riveria Beach decided to pay up. The ransom amount...

iPhone Apps Surreptitiously Communicated with Unknown Servers
From Schneier on Security

iPhone Apps Surreptitiously Communicated with Unknown Servers

Long news article (alternate source) on iPhone privacy, specifically the enormous amount of data your apps are collecting without your knowledge. A lot of this...

Election Security
From Schneier on Security

Election Security

Stanford University's Cyber Policy Center has published a long report on the security of US elections. Summary: it's not good....

Friday Squid Blogging: Squid Tea Bags
From Schneier on Security

Friday Squid Blogging: Squid Tea Bags

It's pu'er tea -- from Japan. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting...

Backdoor Built into Android Firmware
From Schneier on Security

Backdoor Built into Android Firmware

In 2017, some Android phones came with a backdoor pre-installed: Criminals in 2017 managed to get an advanced backdoor preinstalled on Android devices before they...

Fake News and Pandemics
From Schneier on Security

Fake News and Pandemics

When the next pandemic strikes, we'll be fighting it on two fronts. The first is the one you immediately think about: understanding the disease, researching a cure...

How Apple's "Find My" Feature Works
From Schneier on Security

How Apple's "Find My" Feature Works

Matthew Green intelligently speculates about how Apple's new "Find My" feature works. If you haven't already been inspired by the description above, let me phrase...

Hacking Hardware Security Modules
From Schneier on Security

Hacking Hardware Security Modules

Security researchers Gabriel Campana and Jean-Baptiste Bédrune are giving a hardware security module (HSM) talk at BlackHat in August: This highly technical presentation...

Risks of Password Managers
From Schneier on Security

Risks of Password Managers

Stuart Schechter writes about the security risks of using a password manager. It's a good piece, and nicely discusses the trade-offs around password managers: which...

Maciej Cegłowski on Privacy in the Information Age
From Schneier on Security

Maciej Cegłowski on Privacy in the Information Age

Maciej Cegłowski has a really good essay explaining how to think about privacy today: For the purposes of this essay, I'll call it "ambient privacy" -- the understanding...

Data, Surveillance, and the AI Arms Race
From Schneier on Security

Data, Surveillance, and the AI Arms Race

According to foreign policy experts and the defense establishment, the United States is caught in an artificial intelligence arms race with China -- one with serious...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account