acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorBruce Schneier
bg-corner

Amtrak Security Awareness
From Schneier on Security

Amtrak Security Awareness

I like this Amtrak security awareness campaign. Especially the use of my term "security theater."...

Tesla Model S Hack
From Schneier on Security

Tesla Model S Hack

Impressive remote ,a href="http://www.pcworld.com/article/3121999/security/researchers-demonstrate-remote-attack-against-tesla-model-s.html">hack of the Tesla Model...

Two Good Essays on the NSA's "Upstream" Data Collection under Section 702
From Schneier on Security

Two Good Essays on the NSA's "Upstream" Data Collection under Section 702

Both are worth reading....

More on the Equities Debate
From Schneier on Security

More on the Equities Debate

This is an interesting back-and-forth: initial post by Dave Aitel and Matt Tait, a reply by Mailyn Filder, a short reply by Aitel, and a reply to the reply by Filder...

Periscope ATM Skimmers
From Schneier on Security

Periscope ATM Skimmers

"Periscope skimmers" are the most sophisticated kind of ATM skimmers. They are entirely inside the ATM, meaning they're impossible to notice. They're been found...

Friday Squid Blogging: Giant Squid on Japanese Television
From Schneier on Security

Friday Squid Blogging: Giant Squid on Japanese Television

I got this video from PZ Myers's blog. I know absolutely nothing about it. As usual, you can also use this squid post to talk about the security stories in the...

Hacking Bridge-Hand Generation Software
From Schneier on Security

Hacking Bridge-Hand Generation Software

Interesting: Roughly three weeks later, there is a operation program available to crack ACBL hand records. Given three consecutive boards, all the remaining boards...

Hacking Wireless Tire-Pressure Monitoring System
From Schneier on Security

Hacking Wireless Tire-Pressure Monitoring System

Research paper: "Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study," by Ishtiaq Rouf, Rob Miller, Hossen...

Recovering an iPhone 5c Passcode
From Schneier on Security

Recovering an iPhone 5c Passcode

Remember the San Bernadino killer's iPhone, and how the FBI maintained that they couldn't get the encryption key without Apple providing them with a universal back...

Organizational Doxing and Disinformation
From Schneier on Security

Organizational Doxing and Disinformation

In the past few years, the devastating effects of hackers breaking into an organization's network, stealing confidential data, and publishing everything have been...

Someone Is Learning How to Take Down the Internet
From Schneier on Security

Someone Is Learning How to Take Down the Internet

Over the past year or two, someone has been probing the defenses of the companies that run critical pieces of the Internet. These probes take the form of precisely...

Leaked Stingray Manuals
From Schneier on Security

Leaked Stingray Manuals

The Intercept has published the manuals for Harris Corporation's IMSI catcher: Stingray. It's an impressive surveillance device....

USB Kill Stick
From Schneier on Security

USB Kill Stick

It costs less than $60. For just a few bucks, you can pick up a USB stick that destroys almost anything that it's plugged into. Laptops, PCs, televisions, photo...

Malware Infects Network Hard Drives
From Schneier on Security

Malware Infects Network Hard Drives

The malware "Mal/Miner-C" infects Internet-exposed Seagate Central Network Attached Storage (NAS) devices, and from there takes over connected computers to mine...

Friday Squid Blogging: More Research Inspired by Squid Skin
From Schneier on Security

Friday Squid Blogging: More Research Inspired by Squid Skin

Research on color-changing materials: What do squid and jellyfish skin have in common with human skin? All three have inspired a team of chemists to create materials...

Leaked Product Demo from RCS Labs
From Schneier on Security

Leaked Product Demo from RCS Labs

We have leak from yet another cyberweapons arms manufacturer: the Italian company RCS Labs. Vice Motherboard reports on a surveillance video demo: The video shows...

DDOS for Profit
From Schneier on Security

DDOS for Profit

Brian Krebs reports that the Israeli DDOS service vDOS has earned $600K in the past two years. The information was obtained from a hack and data dump of the company's...

Apple's Cloud Key Vault
From Schneier on Security

Apple's Cloud Key Vault

Ever since Ian Kristi, Apple's Head of Security Engineering and Architecture, presented the company's key backup technology at Black Hat 2016, people have been...

Talk by the Former Head of French SIGINT
From Schneier on Security

Talk by the Former Head of French SIGINT

For former head of French SIGINT gave a talk (removed from YouTube where he talked about a lot of things he probably shouldn't have. If anyone has 1) a transcript...

Internet Disinformation Service for Hire
From Schneier on Security

Internet Disinformation Service for Hire

Yet another leaked catalog of Internet attack services, this one specializing in disinformation: But Aglaya had much more to offer, according to its brochure. For...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account