acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorBruce Schneier
bg-corner

More on Election Security
From Schneier on Security

More on Election Security

Andrew Appel has a good two-part essay on securing elections. And three organizations -- Verified Voting, EPIC, and Common Cause -- have published a report on the...

Prisoner's Dilemma Experiment Illustrates Four Basic Phenotypes
From Schneier on Security

Prisoner's Dilemma Experiment Illustrates Four Basic Phenotypes

If you've read my book Liars and Outliers, you know I like the prisoner's dilemma as a way to think about trust and security. There is an enormous amount of research...

Major NSA/Equation Group Leak
From Schneier on Security

Major NSA/Equation Group Leak

The NSA was badly hacked in 2013, and we're just now learning about it. A group of hackers called "The Shadow Brokers" claim to have hacked the NSA, and are posting...

Powerful Bit-Flipping Attack
From Schneier on Security

Powerful Bit-Flipping Attack

New research: "Flip Feng Shui: Hammering a Needle in the Software Stack," by Kaveh Razavi, Ben Gras, Erik Bosman Bart Preneel, Cristiano Giuffrida, and Herbert...

Yet Another Government-Sponsored Malware
From Schneier on Security

Yet Another Government-Sponsored Malware

Both Kaspersky and Symantec have uncovered another piece of malware that seems to be a government design: The malware -- known alternatively as "ProjectSauron"...

Microsoft Accidentally Leaks Key to Windows Backdoor
From Schneier on Security

Microsoft Accidentally Leaks Key to Windows Backdoor

In a cautionary tale to those who favor government-mandated backdoors to security systems, Microsoft accidentally leaked the key protecting its UEFI Secure boot...

Friday Squid Blogging: Squid Not Killing New Zealand Sea Lions
From Schneier on Security

Friday Squid Blogging: Squid Not Killing New Zealand Sea Lions

Experts are blaming bacteria, not squid nets....

Cyberattacks via Submarine
From Schneier on Security

Cyberattacks via Submarine

Some minimal information about the NSA's abilities to hack networks via submarine....

Hacking Electronic Safes
From Schneier on Security

Hacking Electronic Safes

Nice attack against electronic safes: Plore used side-channel attacks to pull it off. These are ways of exploiting physical indicators from a cryptographic system...

Hacking Your Computer Monitor
From Schneier on Security

Hacking Your Computer Monitor

Here's an interesting hack against a computer's monitor: A group of researchers has found a way to hack directly into the tiny computer that controls your monitor...

Hackers Stealing Cars
From Schneier on Security

Hackers Stealing Cars

We're seeing car thefts in the wild accomplished through hacking: Houston police have arrested two men for a string of high-tech thefts of trucks and SUVs in the...

Scott Atran on Why People Become Terrorists
From Schneier on Security

Scott Atran on Why People Become Terrorists

Scott Atran has done some really interesting research on why ordinary people become terrorists. Academics who study warfare and terrorism typically don't conduct...

Hacking the Internet of Things: Locks and Thermostats
From Schneier on Security

Hacking the Internet of Things: Locks and Thermostats

At Defcon last weekend, researchers demonstrated hacks against Bluetooth door locks and Internet-enabled thermostats....

Malware from Kazakhstan
From Schneier on Security

Malware from Kazakhstan

EFF has the story of malware from the Kazakhstan government against "journalists and political activists critical of Kazakhstan's authoritarian government, along...

GPS Spoofing
From Schneier on Security

GPS Spoofing

It's easy to spoof GPS signals, and hard to defend against....

How the Iranian Government Hacks Dissidents
From Schneier on Security

How the Iranian Government Hacks Dissidents

Citizen Lab has a new report on an Iranian government hacking program that targets dissidents. From a Washington Post op-ed by Ron Deibert: Al-Ameer is a net savvy...

More on Voting Machine Security
From Schneier on Security

More on Voting Machine Security

Good article. And I was interviews on WGBH on the topic....

Friday Squid Blogging: Squid Ink Soda
From Schneier on Security

Friday Squid Blogging: Squid Ink Soda

You can order a cocktail made with squid ink soda at Hank's Oyster Bar in Washington, DC....

Reddit "Ask Me Anything"
From Schneier on Security

Reddit "Ask Me Anything"

I did an AMA on Reddit a few days ago. My Reddit AMA from 2013....

Hacking Trucks
From Schneier on Security

Hacking Trucks

Another hijack attack against vehicles, this time trucks and buses....
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account