acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Recovering Smartphone Typing from Microphone Sounds
From Schneier on Security

Recovering Smartphone Typing from Microphone Sounds

Yet another side-channel attack on smartphones: "Hearing your touch: A new acoustic side channel on smartphones," by Ilia Shumailov, Laurent Simon, Jeff Yan, and...

Friday Squid Blogging: Restoring the Giant Squid at the Museum of Natural History
From Schneier on Security

Friday Squid Blogging: Restoring the Giant Squid at the Museum of Natural History

It is traveling to Paris. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting...

NSA-Inspired Vulnerability Found in Huawei Laptops
From Schneier on Security

NSA-Inspired Vulnerability Found in Huawei Laptops

This is an interesting story of a serious vulnerability in a Huawei driver that Microsoft found. The vulnerability is similar in style to the NSA's DOUBLEPULSAR...

Malware Installed in Asus Computers Through Hacked Update Process
From Schneier on Security

Malware Installed in Asus Computers Through Hacked Update Process

Kaspersky Labs is reporting on a new supply chain attack they call "Shadowhammer." In January 2019, we discovered a sophisticated supply chain attack involving...

Programmers Who Don't Understand Security Are Poor at Security
From Schneier on Security

Programmers Who Don't Understand Security Are Poor at Security

A university study confirmed the obvious: if you pay a random bunch of freelance programmers a small amount of money to write security software, they're not going...

Personal Data Left on Used Laptops
From Schneier on Security

Personal Data Left on Used Laptops

A recent experiment found all sorts of personal data left on used laptops and smartphones. This should come as no surprise. Simson Garfinkel performed the same...

Mail Fishing
From Schneier on Security

Mail Fishing

Not email, paper mail: Thieves, often at night, use string to lower glue-covered rodent traps or bottles coated with an adhesive down the chute of a sidewalk mailbox...

Friday Squid Blogging: New Research on Squid Camouflage
From Schneier on Security

Friday Squid Blogging: New Research on Squid Camouflage

From the New York Times: Now, a paper published last week in Nature Communications suggests that their chromatophores, previously thought to be mainly pockets of...

Enigma, Typex, and Bombe Simulators
From Schneier on Security

Enigma, Typex, and Bombe Simulators

GCHQ has put simulators for the Enigma, Typex, and Bombe on the Internet. News article....

First Look Media Shutting Down Access to Snowden NSA Archives
From Schneier on Security

First Look Media Shutting Down Access to Snowden NSA Archives

The Daily Beast is reporting that First Look Media -- home of The Intercept and Glenn Greenwald -- is shutting down access to the Snowden archives. The Intercept...

Zipcar Disruption
From Schneier on Security

Zipcar Disruption

This isn't a security story, but it easily could have been. Last Saturday, Zipcar had a system outage: "an outage experienced by a third party telecommunications...

An Argument that Cybersecurity Is Basically Okay
From Schneier on Security

An Argument that Cybersecurity Is Basically Okay

Andrew Odlyzko's new essay is worth reading -- "Cybersecurity is not very important": Abstract: There is a rising tide of security breaches. There is an even faster...

Triton
From Schneier on Security

Triton

Good article on the Triton malware which targets industrial control systems....

CAs Reissue Over One Million Weak Certificates
From Schneier on Security

CAs Reissue Over One Million Weak Certificates

Turns out that the software a bunch of CAs used to generate public-key certificates was flawed: they created random serial numbers with only 63 bits instead of...

Friday Squid Blogging: A Squid-Related Vacation Tour in Hawaii
From Schneier on Security

Friday Squid Blogging: A Squid-Related Vacation Tour in Hawaii

You can hunt for the Hawaiian bobtail squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read...

I Was Cited in a Court Decision
From Schneier on Security

I Was Cited in a Court Decision

An article I co-wrote -- my first law journal article -- was cited by the Massachusetts Supreme Judicial Court -- the state supreme court -- in a case on compelled...

Upcoming Speaking Engagements
From Schneier on Security

Upcoming Speaking Engagements

This is a current list of where and when I am scheduled to speak: I'm teaching a live online class called "Spotlight on Cloud: The Future of Internet Security with...

Critical Flaw in Swiss Internet Voting System
From Schneier on Security

Critical Flaw in Swiss Internet Voting System

Researchers have found a critical flaw in the Swiss Internet voting system. I was going to write an essay about how this demonstrates that Internet voting is a...

DARPA Is Developing an Open-Source Voting System
From Schneier on Security

DARPA Is Developing an Open-Source Voting System

This sounds like a good development: ...a new $10 million contract the Defense Department's Defense Advanced Research Projects Agency (DARPA) has launched to design...

Judging Facebook's Privacy Shift
From Schneier on Security

Judging Facebook's Privacy Shift

Facebook is making a new and stronger commitment to privacy. Last month, the company hired three of its most vociferous critics and installed them in senior technical...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account