acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Two New Papers on the Encryption Debate
From Schneier on Security

Two New Papers on the Encryption Debate

Seems like everyone is writing about encryption and backdoors this season. "Policy Approaches to the Encryption Debate," R Street Policy Study #133, by Charles...

Friday Squid Blogging: Interesting Interview
From Schneier on Security

Friday Squid Blogging: Interesting Interview

Here's an hour-long audio interview with squid scientist Sarah McAnulty. As usual, you can also use this squid post to talk about the security stories in the news...

OURSA Conference
From Schneier on Security

OURSA Conference

Responding to the lack of diversity at the RSA Conference, a group of security experts have announced a competing one-day conference: OUR Security Advocates, or...

History of the US Army Security Agency
From Schneier on Security

History of the US Army Security Agency

Interesting history of the US Army Security Agency in the early years of Cold War Germany....

New DDoS Reflection-Attack Variant
From Schneier on Security

New DDoS Reflection-Attack Variant

This is worrisome: DDoS vandals have long intensified their attacks by sending a small number of specially designed data packets to publicly available services....

Security Vulnerabilities in Smart Contracts
From Schneier on Security

Security Vulnerabilities in Smart Contracts

Interesting research: "Finding The Greedy, Prodigal, and Suicidal Contracts at Scale": Abstract: Smart contracts -- stateful executable objects hosted on blockchains...

Intimate Partner Threat
From Schneier on Security

Intimate Partner Threat

Princeton's Karen Levy has a good article computer security and the intimate partner threat: When you learn that your privacy has been compromised, the common advice...

Extracting Secrets from Machine Learning Systems
From Schneier on Security

Extracting Secrets from Machine Learning Systems

This is fascinating research about how the underlying training data for a machine-learning system can be inadvertently exposed. Basically, if a machine-learning...

Friday Squid Blogging: Searching for Humboldt Squid with Electronic Bait
From Schneier on Security

Friday Squid Blogging: Searching for Humboldt Squid with Electronic Bait

Video and short commentary. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting...

Malware from Space
From Schneier on Security

Malware from Space

Since you don't have enough to worry about, here's a paper postulating that space aliens could send us malware capable of destroying humanity. Abstract: A complex...

Russians Hacked the Olympics
From Schneier on Security

Russians Hacked the Olympics

Two weeks ago, I blogged about the myriad of hacking threats against the Olympics. Last week, the Washington Post reported that Russia hacked the Olympics network...

Apple to Store Encryption Keys in China
From Schneier on Security

Apple to Store Encryption Keys in China

Apple is bowing to pressure from the Chinese government and storing encryption keys in China. While I would prefer it if it would take a stand against China, I...

Cellebrite Unlocks iPhones for the US Government
From Schneier on Security

Cellebrite Unlocks iPhones for the US Government

Forbes reports that the Israeli company Cellebrite can probably unlock all iPhone models: Cellebrite, a Petah Tikva, Israel-based vendor that's become the U.S....

E-Mail Leaves an Evidence Trail
From Schneier on Security

E-Mail Leaves an Evidence Trail

If you're going to commit an illegal act, it's best not to discuss it in e-mail. It's also best to Google tech instructions rather than asking someone else to do...

Friday Squid Blogging: The Symbiotic Relationship Between the Bobtail Squid and a Particular Microbe
From Schneier on Security

Friday Squid Blogging: The Symbiotic Relationship Between the Bobtail Squid and a Particular Microbe

This is the story of the Hawaiian bobtail squid and Vibrio fischeri. As usual, you can also use this squid post to talk about the security stories in the news that...

Election Security
From Schneier on Security

Election Security

I joined a letter supporting the Secure Elections Act (S. 2261): The Secure Elections Act strikes a careful balance between state and federal action to secure American...

Harassment By Package Delivery
From Schneier on Security

Harassment By Package Delivery

People harassing women by delivering anonymous packages purchased from Amazon. On the one hand, there is nothing new here. This could have happened decades ago,...

New Spectre/Meltdown Variants
From Schneier on Security

New Spectre/Meltdown Variants

Researchers have discovered new variants of Spectre and Meltdown. The software mitigations for Spectre and Meltdown seem to block these variants, although the eventual...

Facebook Will Verify the Physical Location of Ad Buyers with Paper Postcards
From Schneier on Security

Facebook Will Verify the Physical Location of Ad Buyers with Paper Postcards

It's not a great solution, but it's something: The process of using postcards containing a specific code will be required for advertising that mentions a specific...

On the Security of Walls
From Schneier on Security

On the Security of Walls

Interesting history of the security of walls: Dún Aonghasa presents early evidence of the same principles of redundant security measures at work in 13th century...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account