acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Heart Size: Yet Another Biometric
From Schneier on Security

Heart Size: Yet Another Biometric

Turns out that heart size doesn't change throughout your adult life, and you can use low-level Doppler radar to scan the size -- even at a distance -- as a biometric...

Attack on Old ANSI Random Number Generator
From Schneier on Security

Attack on Old ANSI Random Number Generator

Almost 20 years ago, I wrote a paper that pointed to a potential flaw in the ANSI X9.17 RNG standard. Now, new research has found that the flaw exists in some implementations...

Google Login Security for High-Risk Users
From Schneier on Security

Google Login Security for High-Risk Users

Google has a new login service for high-risk users. it's good, but unforgiving. Logging in from a desktop will require a special USB key, while accessing your data...

Friday Squid Blogging: Steel Mesh Giant Squid Used as Artificial Reef
From Schneier on Security

Friday Squid Blogging: Steel Mesh Giant Squid Used as Artificial Reef

Researchers in the British Virgin Islands have sunk a giant squid made out of steel mesh to serve as an artificial reef. As usual, you can also use this squid post...

FBI Increases Its Anti-Encryption Rhetoric
From Schneier on Security

FBI Increases Its Anti-Encryption Rhetoric

Earlier this month, Deputy Attorney General Rod Rosenstein gave a speech warning that a world with encryption is a world without law -- or something like that....

The Science of Interrogation
From Schneier on Security

The Science of Interrogation

Fascinating article about two psychologists who are studying interrogation techniques. Now, two British researchers are quietly revolutionising the study and practice...

CSE Releases Malware Analysis Tool
From Schneier on Security

CSE Releases Malware Analysis Tool

The Communications Security Establishment of Canada -- basically, Canada's version of the NSA -- has released a suite of malware analysis tools: Assemblyline is...

Reaper Botnet
From Schneier on Security

Reaper Botnet

It's based on the Mirai code, but much more virulent: While Mirai caused widespread outages, it impacted IP cameras and internet routers by simply exploiting their...

Hacking Back
From Schneier on Security

Hacking Back

Hacking back is a terrible idea that just will not die. Josephine Wolff takes apart the new hacking back bill that was introduced in the House recently....

Friday Squid Blogging: "How the Squid Lost Its Shell"
From Schneier on Security

Friday Squid Blogging: "How the Squid Lost Its Shell"

Interesting essay by Danna Staaf, the author of Squid Empire. (I mentioned the book two weeks ago.) As usual, you can also use this squid post to talk about the...

Wondermark on Security
From Schneier on Security

Wondermark on Security

Another comic....

Denuvo DRM Cracked within a Day of Release
From Schneier on Security

Denuvo DRM Cracked within a Day of Release

Denuvo is probably the best digital-rights management system, used to protect computer games. It's regularly cracked within a day. If Denuvo can no longer provide...

Security Flaws in Children's Smart Watches
From Schneier on Security

Security Flaws in Children's Smart Watches

The Norwegian Security Council has published a report detailing a series of security and privacy flaws in smart watches marketed to children. Press release. News...

IoT Cybersecurity: What's Plan B?
From Schneier on Security

IoT Cybersecurity: What's Plan B?

In August, four US Senators introduced a bill designed to improve Internet of Things (IoT) security. The IoT Cybersecurity Improvement Act of 2017 is a modest piece...

Security Flaw in Infineon Smart Cards and TPMs
From Schneier on Security

Security Flaw in Infineon Smart Cards and TPMs

A security flaw in Infineon smart cards and TPMs allows an attacker to recover private keys from the public keys. Basically, the key generation algorithm sometimes...

New KRACK Attack Against Wi-Fi Encryption
From Schneier on Security

New KRACK Attack Against Wi-Fi Encryption

Mathy Vanhoef has just published a devastating attack against WPA2, the 14-year-old encryption protocol used by pretty much all wi-fi systems. Its an interesting...

Friday Squid Blogging: International Squid Awareness Day
From Schneier on Security

Friday Squid Blogging: International Squid Awareness Day

It's International Cephalopod Awareness Days this week, and Tuesday was Squid Day. I can't believe I missed it. As usual, you can also use this squid post to talk...

My Blogging
From Schneier on Security

My Blogging

Blog regulars will notice that I haven't been posting as much lately as I have in the past. There are two reasons. One, it feels harder to find things to write...

Technology to Out Sex Workers
From Schneier on Security

Technology to Out Sex Workers

Two related stories: PornHub is using machine learning algorithms to identify actors in different videos, so as to better index them. People are worried that it...

Impersonating iOS Password Prompts
From Schneier on Security

Impersonating iOS Password Prompts

This is an interesting security vulnerability: because it is so easy to impersonate iOS password prompts, a malicious app can steal your password just by asking...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account