acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorBruce Schneier
bg-corner

Eavesdropping on Typing Over Voice-Over-IP
From Schneier on Security

Eavesdropping on Typing Over Voice-Over-IP

Interesting research: "Don't Skype & Type! Acoustic Eavesdropping in Voice-Over-IP": Abstract: Acoustic emanations of computer keyboards represent a serious privacy...

Hardware Bit-Flipping Attacks in Practice
From Schneier on Security

Hardware Bit-Flipping Attacks in Practice

A year and a half ago, I wrote about hardware bit-flipping attacks, which were then largely theoretical. Now, they can be used to root Android phones: The breakthrough...

How Powell's and Podesta's E-mail Accounts Were Hacked
From Schneier on Security

How Powell's and Podesta's E-mail Accounts Were Hacked

It was a phishing attack....

OPM Attack
From Schneier on Security

OPM Attack

Good long article on the 2015 attack against the US Office of Personnel Management....

Malicious AI
From Schneier on Security

Malicious AI

It's not hard to imagine the criminal possibilities of automation, autonomy, and artificial intelligence. But the imaginings are becoming mainstream -- and the...

UK Admitting "Offensive Cyber" Against ISIS/Daesh
From Schneier on Security

UK Admitting "Offensive Cyber" Against ISIS/Daesh

I think this might be the first time it has been openly acknowledged: Sir Michael Fallon, the defence secretary, has said Britain is using cyber warfare in the...

How Different Stakeholders Frame Security
From Schneier on Security

How Different Stakeholders Frame Security

Josephine Wolff examines different Internet governance stakeholders and how they frame security debates. Her conclusion: The tensions that arise around issues of...

DDoS Attacks against Dyn
From Schneier on Security

DDoS Attacks against Dyn

Yesterday's DDoS attacks against Dyn are being reported everywhere. I have received a gazillion press requests, but I am traveling in Australia and Asia and have...

Friday Squid Blogging: Which Squid Can I Eat?
From Schneier on Security

Friday Squid Blogging: Which Squid Can I Eat?

Interesting article listing the squid species that can still be ethically eaten. The problem, of course, is that on a restaurant menu it's just labeled "squid."...

Privacy Makes Workers More Productive
From Schneier on Security

Privacy Makes Workers More Productive

Interesting research....

President Obama Talks About AI Risk, Cybersecurity, and More
From Schneier on Security

President Obama Talks About AI Risk, Cybersecurity, and More

Interesting interview: Obama: Traditionally, when we think about security and protecting ourselves, we think in terms of armor or walls. Increasingly, I find myself...

Bypassing Intel's ASLR
From Schneier on Security

Bypassing Intel's ASLR

Researchers discover a clever attack that bypasses the address space layout randomization (ALSR) on Intel's CPUs. Here's the paper. It discusses several possible...

Security Lessons from a Power Saw
From Schneier on Security

Security Lessons from a Power Saw

Lance Spitzner looks at the safety features of a power saw and tries to apply them to Internet security: By the way, here are some of the key safety features that...

Intelligence Oversight and How It Can Fail
From Schneier on Security

Intelligence Oversight and How It Can Fail

Former NSA attorneys John DeLong and Susan Hennessay have written a fascinating article describing a particular incident of oversight failure inside the NSA. Technically...

Virtual Kidnapping
From Schneier on Security

Virtual Kidnapping

This is a harrowing story of a scam artist that convinced a mother that her daughter had been kidnapped. More stories are here. It's unclear if these virtual kidnappers...

Friday Squid Blogging: Barramundi with Squid Ink Risotto
From Schneier on Security

Friday Squid Blogging: Barramundi with Squid Ink Risotto

Squid ink risotto is a good accompaniment for any mild fish. As usual, you can also use this squid post to talk about the security stories in the news that I haven't...

Cybersecurity Issues for the Next Administration
From Schneier on Security

Cybersecurity Issues for the Next Administration

On today's Internet, too much power is concentrated in too few hands. In the early days of the Internet, individuals were empowered. Now governments and corporations...

The Psychology of Bad Password Habits
From Schneier on Security

The Psychology of Bad Password Habits

Interesting data and analysis....

Free Online Cybersecurity Economics Course
From Schneier on Security

Free Online Cybersecurity Economics Course

TU Delft is running a free online class in cybersecurity economics....

The Psychological Impact of Doing Classified Intelligence Work
From Schneier on Security

The Psychological Impact of Doing Classified Intelligence Work

Richard Thieme gave a talk on the psychological impact of doing classified intelligence work. Summary here...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account