acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
datePast Year
authorschneier
bg-corner

Nearly 7% of Internet Traffic Is Malicious
From Schneier on Security

Nearly 7% of Internet Traffic Is Malicious

Cloudflare reports on the state of applications security. It claims that 6.8% of Internet traffic is malicious. And that CVEs are exploited as quickly as 22 minutes...

Providing Security Updates to Automobile Software
From Schneier on Security

Providing Security Updates to Automobile Software

Auto manufacturers are just starting to realize the problems of supporting the software in older models: Today’s phones are able to receive updates six to eight...

New Research in Detecting AI-Generated Videos
From Schneier on Security

New Research in Detecting AI-Generated Videos

The latest in what will be a continuing arms race between creating and detecting videos: The new tool the research project is unleashing on deepfakes, called “MISLnet...

Friday Squid Blogging: Sunscreen from Squid Pigments
From Schneier on Security

Friday Squid Blogging: Sunscreen from Squid Pigments

They’re better for the environment. Blog moderation policy.

Compromising the Secure Boot Process
From Schneier on Security

Compromising the Secure Boot Process

This isn’t good: On Thursday, researchers from security firm Binarly revealed that Secure Boot is completely compromised on more than 200 device models sold by...

The CrowdStrike Outage and Market-Driven Brittleness
From Schneier on Security

The CrowdStrike Outage and Market-Driven Brittleness

Friday’s massive internet outage, caused by a mid-sized tech company called CrowdStrike, disrupted major airlines, hospitals, and banks. Nearly 7,000 flights were...

Data Wallets Using the Solid Protocol
From Schneier on Security

Data Wallets Using the Solid Protocol

I am the Chief of Security Architecture at Inrupt, Inc., the company that is commercializing Tim Berners-Lee’s Solid open W3C standard for distributed data ownership...

Robot Dog Internet Jammer
From Schneier on Security

Robot Dog Internet Jammer

Supposedly the DHS has these: The robot, called “NEO,” is a modified version of the “Quadruped Unmanned Ground Vehicle” (Q-UGV) sold to law enforcement by a company...

2017 ODNI Memo on Kaspersky Labs
From Schneier on Security

2017 ODNI Memo on Kaspersky Labs

It’s heavily redacted, but still interesting. Many more ODNI documents here.

Snake Mimics a Spider
From Schneier on Security

Snake Mimics a Spider

This is a fantastic video. It’s an Iranian spider-tailed horned viper (Pseudocerastes urarachnoides). Its tail looks like a spider, which the snake uses to fool...

Friday Squid Blogging: Peru Trying to Protect its Squid Fisheries
From Schneier on Security

Friday Squid Blogging: Peru Trying to Protect its Squid Fisheries

Peru is trying to protect its territorial waters from Chinese squid-fishing boats. Blog moderation policy.

Brett Solomon on Digital Rights
From Schneier on Security

Brett Solomon on Digital Rights

Brett Solomon is retiring from AccessNow after fifteen years as its Executive Director. He’s written a blog post about what he’s learned and what comes next.

Criminal Gang Physically Assaulting People for Their Cryptocurrency
From Schneier on Security

Criminal Gang Physically Assaulting People for Their Cryptocurrency

This is pretty horrific: …a group of men behind a violent crime spree designed to compel victims to hand over access to their cryptocurrency savings. That announcement...

Cloudflare Reports that Almost 7% of All Internet Traffic Is Malicious
From Schneier on Security

Cloudflare Reports that Almost 7% of All Internet Traffic Is Malicious

6.8%, to be precise. From ZDNet: However, Distributed Denial of Service (DDoS) attacks continue to be cybercriminals’ weapon of choice, making up over 37% of all...

Hacking Scientific Citations
From Schneier on Security

Hacking Scientific Citations

Some scholars are inflating their reference counts by sneaking them into metadata: Citations of scientific work abide by a standardized referencing system: Each...

Upcoming Speaking Engagements
From Schneier on Security

Upcoming Speaking Engagements

This is a current list of where and when I am scheduled to speak: I’m speaking on “Reimagining Democracy in the Age of AI” at the Bozeman Library in Bozeman, Montana...

Friday Squid Blogging: 1994 Lair of Squid Game
From Schneier on Security

Friday Squid Blogging: 1994 Lair of Squid Game

I didn’t know: In 1994, Hewlett-Packard released a miracle machine: the HP 200LX pocket-size PC. In the depths of the device, among the MS-DOS productivity apps...

The NSA Has a Long-Lost Lecture by Adm. Grace Hopper
From Schneier on Security

The NSA Has a Long-Lost Lecture by Adm. Grace Hopper

The NSA has a video recording of a 1982 lecture by Adm. Grace Hopper titled “Future Possibilities: Data, Hardware, Software, and People.” The agency is (so far)...

Apple Is Alerting iPhone Users of Spyware Attacks
From Schneier on Security

Apple Is Alerting iPhone Users of Spyware Attacks

Not a lot of details: Apple has issued a new round of threat notifications to iPhone users across 98 countries, warning them of potential mercenary spyware attacks...

RADIUS Vulnerability
From Schneier on Security

RADIUS Vulnerability

New attack against the RADIUS authentication protocol: The Blast-RADIUS attack allows a man-in-the-middle attacker between the RADIUS client and server to forge...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account