acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Problems with the Squid Emoji
From Schneier on Security

Problems with the Squid Emoji

The Monterey Bay Aquarium has some problems with the squid emoji. As usual, you can also use this squid post to talk about the security stories in the news that...

Back Issues of the NSA's Cryptolog
From Schneier on Security

Back Issues of the NSA's Cryptolog

Five years ago, the NSA published 23 years of its internal magazine, Cryptolog. There were lots of redactions, of course. What's new is a nice user interface for...

Banks Attacked through Malicious Hardware Connected to the Local Network
From Schneier on Security

Banks Attacked through Malicious Hardware Connected to the Local Network

Kaspersky is reporting on a series of bank hacks -- called DarkVishnya -- perpetrated through malicious hardware being surreptitiously installed into the target...

Your Personal Data is Already Stolen
From Schneier on Security

Your Personal Data is Already Stolen

In an excellent blog post, Brian Krebs makes clear something I have been saying for a while: Likewise for individuals, it pays to accept two unfortunate and harsh...

Security Risks of Chatbots
From Schneier on Security

Security Risks of Chatbots

Good essay on the security risks -- to democratic discourse -- of chatbots....

Bad Consumer Security Advice
From Schneier on Security

Bad Consumer Security Advice

There are lots of articles about there telling people how to better secure their computers and online accounts. While I agree with some of it, this article contains...

The DoJ's Secret Legal Arguments to Break Cryptography
From Schneier on Security

The DoJ's Secret Legal Arguments to Break Cryptography

Earlier this year, the US Department of Justice made a series of legal arguments as to why Facebook should be forced to help the government wiretap Facebook Messenger...

Friday Squid Blogging: Japanese Squid-Fishing Towns in Decline
From Schneier on Security

Friday Squid Blogging: Japanese Squid-Fishing Towns in Decline

It's a problem: But now, fluctuations in ocean temperatures, years of overfishing and lax regulatory oversight have drastically depleted populations of the translucent...

Click Here to Kill Everybody News
From Schneier on Security

Click Here to Kill Everybody News

My latest book is doing well. And I've been giving lots of talks and interviews about it. (I can recommend three interviews: the Cyberlaw podcast with Stewart Baker...

Three-Rotor Enigma Machine Up for Auction Today
From Schneier on Security

Three-Rotor Enigma Machine Up for Auction Today

Sotheby's is auctioning off a (working, I think) three-rotor Enigma machine today. They're expecting it to sell for about $200K. I have an Enigma, but it's without...

That Bloomberg Supply-Chain-Hack Story
From Schneier on Security

That Bloomberg Supply-Chain-Hack Story

Back in October, Bloomberg reported that China has managed to install backdoors into server equipment that ended up in networks belonging to -- among others --...

FBI Takes Down a Massive Advertising Fraud Ring
From Schneier on Security

FBI Takes Down a Massive Advertising Fraud Ring

The FBI announced that it dismantled a large Internet advertising fraud network, and arrested eight people: A 13-count indictment was unsealed today in federal...

Distributing Malware By Becoming an Admin on an Open-Source Project
From Schneier on Security

Distributing Malware By Becoming an Admin on an Open-Source Project

The module "event-steam" was infected with malware by an anonymous someone who became an admin on the project. Cory Doctorow points out that this is a clever new...

Propaganda and the Weakening of Trust in Government
From Schneier on Security

Propaganda and the Weakening of Trust in Government

On November 4, 2016, the hacker "Guccifer 2.0,: a front for Russia's military intelligence service, claimed in a blogpost that the Democrats were likely to use...

How Surveillance Inhibits Freedom of Expression
From Schneier on Security

How Surveillance Inhibits Freedom of Expression

In my book Data and Goliath, I write about the value of privacy. I talk about how it is essential for political liberty and justice, and for commercial fairness...

Friday Squid Blogging: Good Squid Fishing in the Exmouth Gulf
From Schneier on Security

Friday Squid Blogging: Good Squid Fishing in the Exmouth Gulf

The conditions are ideal for squid fishing in the Exmouth Gulf in West Australia. As usual, you can also use this squid post to talk about the security stories...

Using Machine Learning to Create Fake Fingerprints
From Schneier on Security

Using Machine Learning to Create Fake Fingerprints

Researchers are able to create fake fingerprints that result in a 20% false-positive rate. The problem is that these sensors obtain only partial images of users'...

Information Attacks against Democracies
From Schneier on Security

Information Attacks against Democracies

Democracy is an information system. That's the starting place of our new paper: "Common-Knowledge Attacks on Democracy." In it, we look at democracy through the...

The PCLOB Needs a Director
From Schneier on Security

The PCLOB Needs a Director

The US Privacy and Civil Liberties Oversight Board is looking for a director. Among other things, this board has some oversight role over the NSA. More precisely...

What Happened to Cyber 9/11?
From Schneier on Security

What Happened to Cyber 9/11?

A recent article in the Atlantic asks why we haven't seen a"cyber 9/11" in the past fifteen or so years. (I, too, remember the increasingly frantic and fearful...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account