acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

New Variants of Cold-Boot Attack
From Schneier on Security

New Variants of Cold-Boot Attack

If someone has physical access to your shut-down computer, they can probably break the hard-drive's encryption. This is a "cold boot" attack, and one we thought...

Friday Squid Blogging: British Columbia "Squid Run" Is a Tourist Attraction
From Schneier on Security

Friday Squid Blogging: British Columbia "Squid Run" Is a Tourist Attraction

On James Island. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines...

New Findings About Prime Number Distribution Almost Certainly Irrelevant to Cryptography
From Schneier on Security

New Findings About Prime Number Distribution Almost Certainly Irrelevant to Cryptography

Lots of people are e-mailing me about this new result on the distribution of prime numbers. While interesting, it has nothing to do with cryptography. Cryptographers...

AES Resulted in a $250 Billion Economic Benefit
From Schneier on Security

AES Resulted in a $250 Billion Economic Benefit

NIST has released a new study concluding that the AES encryption standard has resulted in a $250 billion world-wide economic benefit over the past twenty years....

Security Vulnerability in ESS ExpressVote Touchscreen Voting Computer
From Schneier on Security

Security Vulnerability in ESS ExpressVote Touchscreen Voting Computer

Of course the ESS ExpressVote voting computer will have lots of security vulnerabilities. It's a computer, and computers have lots of vulnerabilities. This particular...

Pegasus Spyware Used in 45 Countries
From Schneier on Security

Pegasus Spyware Used in 45 Countries

Citizen Lab has published a new report about the Pegasus spyware. From a ZDNet article: The malware, known as Pegasus (or Trident), was created by Israeli cyber...

Public Shaming of Companies for Bad Security
From Schneier on Security

Public Shaming of Companies for Bad Security

Troy Hunt makes some good points, with good examples....

NSA Attacks Against Virtual Private Networks
From Schneier on Security

NSA Attacks Against Virtual Private Networks

A 2006 document from the Snowden archives outlines successful NSA operations against "a number of "high potential" virtual private networks, including those of...

Friday Squid Blogging: Dissecting a Giant Squid
From Schneier on Security

Friday Squid Blogging: Dissecting a Giant Squid

Lessons learned. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines...

Click Here to Kill Everybody Reviews and Press Mentions
From Schneier on Security

Click Here to Kill Everybody Reviews and Press Mentions

It's impossible to know all the details, but my latest book seems to be selling well. Initial reviews have been really positive: Boing Boing, Financial Times, Harris...

Quantum Computing and Cryptography
From Schneier on Security

Quantum Computing and Cryptography

Quantum computing is a new way of computing -- one that could allow humankind to perform computations that are simply impossible using today's computing technologies...

Security Risks of Government Hacking
From Schneier on Security

Security Risks of Government Hacking

Some of us -- myself included -- have proposed lawful government hacking as an alternative to backdoors. A new report from the Center of Internet and Society looks...

Security Vulnerability in Smart Electric Outlets
From Schneier on Security

Security Vulnerability in Smart Electric Outlets

A security vulnerability in Belkin's Wemo Insight "smartplugs" allows hackers to not only take over the plug, but use it as a jumping-off point to attack everything...

Using Hacked IoT Devices to Disrupt the Power Grid
From Schneier on Security

Using Hacked IoT Devices to Disrupt the Power Grid

This is really interesting research: "BlackIoT: IoT Botnet of High Wattage Devices Can Disrupt the Power Grid": Abstract: We demonstrate that an Internet of Things...

Friday Squid Blogging: 100-kg Squid Caught Off the Coast of Madeira
From Schneier on Security

Friday Squid Blogging: 100-kg Squid Caught Off the Coast of Madeira

News. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here....

Reddit AMA
From Schneier on Security

Reddit AMA

I did a Reddit AMA on Thursday, September 6....

Five-Eyes Intelligence Services Choose Surveillance Over Security
From Schneier on Security

Five-Eyes Intelligence Services Choose Surveillance Over Security

The Five Eyes -- the intelligence consortium of the rich English-speaking countries (the US, Canada, the UK, Australia, and New Zealand) -- have issued a "Statement...

Using a Smartphone's Microphone and Speakers to Eavesdrop on Passwords
From Schneier on Security

Using a Smartphone's Microphone and Speakers to Eavesdrop on Passwords

It's amazing that this is even possible: "SonarSnoop: Active Acoustic Side-Channel Attacks": Abstract: We report the first active acoustic side-channel attack....

New Book Announcement: Click Here to Kill Everybody
From Schneier on Security

New Book Announcement: Click Here to Kill Everybody

I am pleased to announce the publication of my latest book: Click Here to Kill Everybody: Security and Survival in a Hyper-connected World. In it, I examine how...

Friday Squid Blogging: Giant Squid Washes up on Wellington Beach
From Schneier on Security

Friday Squid Blogging: Giant Squid Washes up on Wellington Beach

Another giant squid washed up on a beach, this time in Wellington, New Zealand. Is this a global trend? As usual, you can also use this squid post to talk about...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account