acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorschneier
bg-corner

2020 Workshop on Economics of Information Security
From Schneier on Security

2020 Workshop on Economics of Information Security

The Workshop on Economics of Information Security will be online this year. Register here.

Google Responds to Warrants for “About” Searches
From Schneier on Security

Google Responds to Warrants for “About” Searches

One of the things we learned from the Snowden documents is that the NSA conducts “about” searches. That is, searches based on activities and not identifiers. A...

Hacking Apple for Profit
From Schneier on Security

Hacking Apple for Profit

Five researchers hacked Apple Computer’s networks — not their products — and found fifty-five vulnerabilities. So far, they have received $289K. One of the worst...

Friday Squid Blogging: Squid-like Nebula
From Schneier on Security

Friday Squid Blogging: Squid-like Nebula

Pretty astronomical photo. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting...

Friday Squid Blogging: Saving the Humboldt Squid
From Schneier on Security

Friday Squid Blogging: Saving the Humboldt Squid

Genetic research finds the Humboldt squid is vulnerable to overfishing. As usual, you can also use this squid post to talk about the security stories in the news...

Friday Squid Blogging: Chinese Squid Fishing Near the Galapagos
From Schneier on Security

Friday Squid Blogging: Chinese Squid Fishing Near the Galapagos

The Chinese have been illegally squid fishing near the Galapagos Islands. As usual, you can also use this squid post to talk about the security stories in the news...

New Privacy Features in iOS 14
From Schneier on Security

New Privacy Features in iOS 14

A good rundown.

Swiss-Swedish Diplomatic Row Over Crypto AG
From Schneier on Security

Swiss-Swedish Diplomatic Row Over Crypto AG

Previously I have written about the Swedish-owned Swiss-based cryptographic hardware company: Crypto AG. It was a CIA-owned Cold War operation for decades. Today...

On Risk-Based Authentication
From Schneier on Security

On Risk-Based Authentication

Interesting usability study: “More Than Just Good Passwords? A Study on Usability and Security Perceptions of Risk-based Authentication“: Abstract: Risk-based Authentication...

COVID-19 and Acedia
From Schneier on Security

COVID-19 and Acedia

Note: This isn’t my usual essay topic. Still, I want to put it on my blog. Six months into the pandemic with no end in sight, many of us have been feeling a sense...

Friday Squid Blogging: After Squidnight
From Schneier on Security

Friday Squid Blogging: After Squidnight

Review of a squid-related children’s book. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read...

Detecting Deep Fakes with a Heartbeat
From Schneier on Security

Detecting Deep Fakes with a Heartbeat

Researchers can detect deep fakes because they don’t convincingly mimic human blood circulation in the face: In particular, video of a person’s face contains subtle...

Negotiating with Ransomware Gangs
From Schneier on Security

Negotiating with Ransomware Gangs

Really interesting conversation with someone who negotiates with ransomware gangs: For now, it seems that paying ransomware, while obviously risky and empowering...

Hacking a Coffee Maker
From Schneier on Security

Hacking a Coffee Maker

As expected, IoT devices are filled with vulnerabilities: As a thought experiment, Martin Hron, a researcher at security company Avast, reverse engineered one of...

Documented Death from a Ransomware Attack
From Schneier on Security

Documented Death from a Ransomware Attack

A Dusseldorf woman died when a ransomware attack against a hospital forced her to be taken to a different hospital in another city. I think this is the first documented...

On Executive Order 12333
From Schneier on Security

On Executive Order 12333

Mark Jaycox has written a long article on the US Executive Order 12333: “No Oversight, No Limits, No Worries: A Primer on Presidential Spying and Executive Order...

Iranian Government Hacking Android
From Schneier on Security

Iranian Government Hacking Android

The New York Times wrote about a still-unreleased report from Chckpoint and the Miaan Group: The reports, which were reviewed by The New York Times in advance of...

Interview with the Author of the 2000 Love Bug Virus
From Schneier on Security

Interview with the Author of the 2000 Love Bug Virus

No real surprises, but we finally have the story. The story he went on to tell is strikingly straightforward. De Guzman was poor, and internet access was expensive...

Friday Squid Blogging: COVID-19 Found on Chinese Squid Packaging
From Schneier on Security

Friday Squid Blogging: COVID-19 Found on Chinese Squid Packaging

I thought the virus doesn’t survive well on food packaging: Authorities in China’s northeastern Jilin province have found the novel coronavirus on the packaging...

CEO of NS8 Charged with Securities Fraud
From Schneier on Security

CEO of NS8 Charged with Securities Fraud

The founder and CEO of the Internet security company NS8 has been arrested and “charged in a Complaint in Manhattan federal court with securities fraud, fraud in...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account