acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorBruce Schneier
bg-corner

Fooling Facial Recognition Systems
From Schneier on Security

Fooling Facial Recognition Systems

This is some interesting research. You can fool facial recognition systems by wearing glasses printed with elements of other peoples' faces. Mahmood Sharif, Sruti...

Ultrasonic Hacking
From Schneier on Security

Ultrasonic Hacking

Ad networks are surreptitiously using ultrasonic communications to jump from device to device. It should come as no surprise that this communications channel can...

Regulation of the Internet of Things
From Schneier on Security

Regulation of the Internet of Things

Late last month, popular websites like Twitter, Pinterest, Reddit and PayPal went down for most of a day. The distributed denial-of-service attack that caused the...

Whistleblower Investigative Report on NSA Suite B Cryptography
From Schneier on Security

Whistleblower Investigative Report on NSA Suite B Cryptography

The NSA has been abandoning secret and proprietary cryptographic algorithms in favor of commercial public algorithms, generally known as "Suite B." In 2010, an...

Self-Propagating Smart Light Bulb Worm
From Schneier on Security

Self-Propagating Smart Light Bulb Worm

This is exactly the sort of Internet-of-Things attack that has me worried: "IoT Goes Nuclear: Creating a ZigBee Chain Reaction" by Eyal Ronen, Colin OFlynn, Adi...

Election-Day Humor
From Schneier on Security

Election-Day Humor

This was written in 2004, but still holds true today....

Lessons From the Dyn DDoS Attack
From Schneier on Security

Lessons From the Dyn DDoS Attack

A week ago Friday, someone took down numerous popular websites in a massive distributed denial-of-service (DDoS) attack against the domain name provider Dyn. DDoS...

Firefox Removing Battery Status API
From Schneier on Security

Firefox Removing Battery Status API

Firefox is removing the battery status API, citing privacy concerns. Here's the paper that described those concerns: Abstract. We highlight privacy risks associated...

Research into IoT Security Is Finally Legal
From Schneier on Security

Research into IoT Security Is Finally Legal

For years, the DMCA has been used to stifle legitimate research into the security of embedded systems. Finally, the research exemption to the DMCA is in effect...

Friday Squid Blogging: Whale Hunts Squid
From Schneier on Security

Friday Squid Blogging: Whale Hunts Squid

A sperm whale has been sighted in Monterey Bay, hunting squid. As usual, you can also use this squid post to talk about the security stories in the news that I...

Hacking in the Movies
From Schneier on Security

Hacking in the Movies

New Atlas has a great three-part feature on the history of hacking as portrayed in films, including video clips. The 1980s. The 1990s. The 2000s....

Google Linking Anonymous Browser Tracking with Identifiable Tracking
From Schneier on Security

Google Linking Anonymous Browser Tracking with Identifiable Tracking

Google's new ways to violate your privacy and -- more importantly -- how to opt out....

Teaching a Neural Network to Encrypt
From Schneier on Security

Teaching a Neural Network to Encrypt

Researchers have trained a neural network to encrypt its communications. In their experiment, computers were able to make their own form of encryption using machine...

Free Cybersecurity MOOC from F-Secure and the University of Finland
From Schneier on Security

Free Cybersecurity MOOC from F-Secure and the University of Finland

Looks interesting. Finnish residents can take it for credit....

Edward Snowden's Boss at Booz Allen Hamilton Speaks
From Schneier on Security

Edward Snowden's Boss at Booz Allen Hamilton Speaks

Interesting. I have no idea how much of it to believe....

Another Shadow Brokers Leak
From Schneier on Security

Another Shadow Brokers Leak

There's another leak of NSA hacking tools and data from the Shadow Brokers. This one includes a list of hacked sites. According to analyses from researchers here...

Card Game Based on the Iterated Prisoner's Dilemma
From Schneier on Security

Card Game Based on the Iterated Prisoner's Dilemma

Interesting....

How to Avoid Kidnapping Children on Halloween
From Schneier on Security

How to Avoid Kidnapping Children on Halloween

A useful guide....

A High-End Card-Reading Device
From Schneier on Security

A High-End Card-Reading Device

An impressive Chinese device that automatically reads marked cards in order to cheat at poker and other card games....

Friday Squid Blogging: Squid Nebula
From Schneier on Security

Friday Squid Blogging: Squid Nebula

Beautiful. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account