acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
datePast Year
authorBruce Schneier
bg-corner

IoT Devices in Password-Spraying Botnet
From Schneier on Security

IoT Devices in Password-Spraying Botnet

Microsoft is warning Azure cloud users that a Chinese controlled botnet is engaging in “highly evasive” password spraying. Not sure about the “highly evasive” part...

AIs Discovering Vulnerabilities
From Schneier on Security

AIs Discovering Vulnerabilities

I’ve been writing about the possibility of AIs automatically discovering code vulnerabilities since at least 2018. This is an ongoing area of research: AIs doing...

Sophos Versus the Chinese Hackers
From Schneier on Security

Sophos Versus the Chinese Hackers

Really interesting story of Sophos’s five-year war against Chinese hackers.

Friday Squid Blogging: Squid Sculpture in Massachusetts Building
From Schneier on Security

Friday Squid Blogging: Squid Sculpture in Massachusetts Building

Great blow-up sculpture. Blog moderation policy.

Roger Grimes on Prioritizing Cybersecurity Advice
From Schneier on Security

Roger Grimes on Prioritizing Cybersecurity Advice

This is a good point: Part of the problem is that we are constantly handed lists…list of required controls…list of things we are being asked to fix or improve…lists...

Tracking World Leaders Using Strava
From Schneier on Security

Tracking World Leaders Using Strava

Way back in 2018, people noticed that you could find secret military bases using data published by the Strava fitness app. Soldiers and other military personalLe...

Simpson Garfinkel on Spooky Cryptographic Action at a Distance
From Schneier on Security

Simpson Garfinkel on Spooky Cryptographic Action at a Distance

Excellent read. One example: Consider the case of basic public key cryptography, in which a person’s public and private key are created together in a single operation...

Law Enforcement Deanonymizes Tor Users
From Schneier on Security

Law Enforcement Deanonymizes Tor Users

The German police have successfully deanonymized at least four Tor users. It appears they watch known Tor relays and known suspects, and use timing analysis towritten...

Criminals Are Blowing up ATMs in Germany
From Schneier on Security

Criminals Are Blowing up ATMs in Germany

It’s low tech, but effective. Why Germany? It has more ATMs than other European countries, and—if I read the article right—they have more money in them.

Friday Squid Blogging: Giant Squid Found on Spanish Beach
From Schneier on Security

Friday Squid Blogging: Giant Squid Found on Spanish Beach

A giant squid has washed up on a beach in Northern Spain. Blog moderation policy.

Watermark for LLM-Generated Text
From Schneier on Security

Watermark for LLM-Generated Text

Researchers at Google have developed a watermark for LLM-generated text. The basics are pretty obvious: the LLM chooses between tokens partly based on a cryptographic...

Are Automatic License Plate Scanners Constitutional?
From Schneier on Security

Are Automatic License Plate Scanners Constitutional?

An advocacy groups is filing a Fourth Amendment challenge against automatic license plate readers. “The City of Norfolk, Virginia, has installed a network of cameras...

No, The Chinese Have Not Broken Modern Encryption Systems with a Quantum Computer
From Schneier on Security

No, The Chinese Have Not Broken Modern Encryption Systems with a Quantum Computer

The headline is pretty scary: “China’s Quantum Computer Scientists Crack Military-Grade Encryption.” No, it’s not true. This debunking saved me the trouble of writing...

Friday Squid Blogging: Squid Scarf
From Schneier on Security

Friday Squid Blogging: Squid Scarf

Cute squid scarf. Blog moderation policy.

Justice Department Indicts Tech CEO for Falsifying Security Certifications
From Schneier on Security

Justice Department Indicts Tech CEO for Falsifying Security Certifications

The Wall Street Journal is reporting that the CEO of a still unnamed company has been indicted for creating a fake auditing company to falsify security certifications...

Cheating at Conkers
From Schneier on Security

Cheating at Conkers

The men’s world conkers champion is accused of cheating with a steel chestnut.

More Details on Israel Sabotaging Hezbollah Pagers and Walkie-Talkies
From Schneier on Security

More Details on Israel Sabotaging Hezbollah Pagers and Walkie-Talkies

The Washington Post has a long and detailed story about the operation that’s well worth reading (alternate version here). The sales pitch came from a marketing...

Perfectl Malware
From Schneier on Security

Perfectl Malware

Perfectl in an impressive piece of malware: The malware has been circulating since at least 2021. It gets installed by exploiting more than 20,000 common misconfigurations...

Indian Fishermen Are Catching Less Squid
From Schneier on Security

Indian Fishermen Are Catching Less Squid

Fishermen in Tamil Nadu are reporting smaller catches of squid. Blog moderation policy.

More on My AI and Democracy Book
From Schneier on Security

More on My AI and Democracy Book

In July, I wrote about my new book project on AI and democracy, to be published by MIT Press in fall 2025. My co-author and collaborator Nathan Sanders and I are...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account