acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorBruce Schneier
bg-corner

Internet Disinformation Service for Hire
From Schneier on Security

Internet Disinformation Service for Hire

Yet another leaked catalog of Internet attack services, this one specializing in disinformation: But Aglaya had much more to offer, according to its brochure. For...

Spy Equipment from Cobham
From Schneier on Security

Spy Equipment from Cobham

The Intercept has published a 120-page catalog of spy gear from the British defense company Cobham. This is equipment available to police forces. The catalog was...

Friday Squid Blogging: Korean Spicy Grilled Squid
From Schneier on Security

Friday Squid Blogging: Korean Spicy Grilled Squid

Easy recipe. You can get the red pepper flakes and red pepper paste at most grocery stores. As usual, you can also use this squid post to talk about the security...

Cybercrime as a Tax on the Internet Economy
From Schneier on Security

Cybercrime as a Tax on the Internet Economy

I was reading this 2014 McAfee report on the economic impact of cybercrime, and came across this interesting quote on how security is a tax on the Internet economy...

NSO Group
From Schneier on Security

NSO Group

We're starting to see some information on the Israeli cyber-weapons arms manufacturer that sold the iPhone zero-day exploit to the United Arab Emirates so they...

Using Wi-Fi Signals to Identify People by Body Shape
From Schneier on Security

Using Wi-Fi Signals to Identify People by Body Shape

Another paper on using Wi-Fi for surveillance. This one is on identifying people by their body shape. "FreeSense:Indoor Human Identification with WiFi Signals":...

Keystroke Recognition from Wi-Fi Distortion
From Schneier on Security

Keystroke Recognition from Wi-Fi Distortion

This is interesting research: "Keystroke Recognition Using WiFi Signals." Basically, the user's hand positions as they type distorts the Wi-Fi signal in predictable...

iPhone Zero-Day Used by UAE Government
From Schneier on Security

iPhone Zero-Day Used by UAE Government

Last week, Apple issued a critical security patch for the iPhone: iOS 9.3.5. The incredible story is that this patch is the result of investigative work by Citizen...

Apple Patents Collecting Biometric Information Based on Unauthorized Device Use
From Schneier on Security

Apple Patents Collecting Biometric Information Based on Unauthorized Device Use

Apple received a patent earlier this year on collecting biometric information of an unauthorized device user. The obvious application is taking a copy of the fingerprint...

Friday Squid Blogging: Self-Repairing Fabrics Based on Squid Teeth
From Schneier on Security

Friday Squid Blogging: Self-Repairing Fabrics Based on Squid Teeth

Really: As shown in the video below, researchers at Pennsylvania State University recently developed a polyelectrolyte liquid solution made of bacteria and yeast...

Collision Attacks Against 64-Bit Block Ciphers
From Schneier on Security

Collision Attacks Against 64-Bit Block Ciphers

We've long known that 64 bits is too small for a block cipher these days. That's why new block ciphers like AES have 128-bit, or larger, block sizes. The insecurity...

The NSA is Hoarding Vulnerabilities
From Schneier on Security

The NSA is Hoarding Vulnerabilities

The National Security Agency is lying to us. We know that because of data stolen from an NSA server was dumped on the internet. The agency is hoarding information...

Confusing Security Risks with Moral Judgments
From Schneier on Security

Confusing Security Risks with Moral Judgments

Interesting research that shows we exaggerate the risks of something when we find it morally objectionable. From an article about and interview with the researchers...

Interesting Internet-Based Investigative Techniques
From Schneier on Security

Interesting Internet-Based Investigative Techniques

In this article, detailing the Australian and then worldwide investigation of a particularly heinous child-abuse ring, there are a lot of details of the pedophile...

Privacy Implications of Windows 10
From Schneier on Security

Privacy Implications of Windows 10

The EFF has a good analysis of all the ways Windows 10 violates your privacy....

Research on the Timing of Security Warnings
From Schneier on Security

Research on the Timing of Security Warnings

fMRI experiments show that we are more likely to ignore security warnings when they interrupt other tasks. A new study from BYU, in collaboration with Google Chrome...

Terrorist False Alarm at JFK Airport Demonstrates How Unprepared We Really Are
From Schneier on Security

Terrorist False Alarm at JFK Airport Demonstrates How Unprepared We Really Are

The detailed accounts of the terrorist-shooter false-alarm at Kennedy Airport in New York last week illustrate how completely and totally unprepared the airport...

Windows 10 Update Breaks Most Webcams
From Schneier on Security

Windows 10 Update Breaks Most Webcams

Now's your chance.......

Friday Squid Blogging: Stubby Squid
From Schneier on Security

Friday Squid Blogging: Stubby Squid

Photo of the cutest squid ever. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Unintentional DOS Attack against Car-Door Openers
From Schneier on Security

Unintentional DOS Attack against Car-Door Openers

Radio noise from a nearby neon-sign transformer made it impossible for people to unlock their cars remotely....
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account