acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorBruce Schneier
bg-corner

Suckfly
From Schneier on Security

Suckfly

Suckfly seems to be another Chinese nation-state espionage tool, first stealing South Korean certificates and now attacking Indian networks. Symantec has done a...

Companies Not Saving Your Data
From Schneier on Security

Companies Not Saving Your Data

There's a new trend in Silicon Valley startups; companies are not collecting and saving data on their customers: In Silicon Valley, there's a new emphasis on putting...

Should You Be Allowed to Prevent Drones from Flying Over Your Property?
From Schneier on Security

Should You Be Allowed to Prevent Drones from Flying Over Your Property?

Good debate in the Wall Street Journal. This isn't an obvious one; there are good arguments on both sides....

GCHQ Discloses Two OS X Vulnerabilities to Apple
From Schneier on Security

GCHQ Discloses Two OS X Vulnerabilities to Apple

This is good news: Communications and Electronics Security Group (CESG), the information security arm of GCHQ, was credited with the discovery of two vulnerabilities...

Google Moving Forward on Automatic Logins
From Schneier on Security

Google Moving Forward on Automatic Logins

Google is trying to bring this to Android developers by the end of the year: Today, secure logins -- like those used by banks or in the enterprise environment -...

State of Online Tracking
From Schneier on Security

State of Online Tracking

Really interesting research: "Online tracking: A 1-million-site measurement and analysis," by Steven Englehardt and Arvind Narayanan: Abstract: We present the largest...

Friday Squid Blogging: Squid Kite
From Schneier on Security

Friday Squid Blogging: Squid Kite

Video. Plus an octopus kite, with another squid kite in the background. As usual, you can also use this squid post to talk about the security stories in the news...

Detecting Explosives
From Schneier on Security

Detecting Explosives

Really interesting article on the difficulties involved with explosive detection at airport security checkpoints. Abstract: The mid-air bombing of a Somali passenger...

Identifying People from Their Metadata
From Schneier on Security

Identifying People from Their Metadata

Jonathan Mayer, Patrick Mutchler, and John C. Mitchell, "Evaluating the privacy properties of telephone metadata": Abstract: Since 2013, a stream of disclosures...

Primitive Food Crops and Security
From Schneier on Security

Primitive Food Crops and Security

Economists argue that the security needs of various crops are the cause of civilization size: The argument depends on the differences between how grains and tubers...

More NSA Documents from the Snowden Archive
From Schneier on Security

More NSA Documents from the Snowden Archive

The Intercept is starting to publish a lot more documents. Yesterday they published the first year of an internal newsletter called SIDtoday, along with several...

Unforeseen Costs of Security Training
From Schneier on Security

Unforeseen Costs of Security Training

At the last match of the year for Manchester United, someone found a bomb in a toilet, and security evacuated all 75,000 people and canceled the match. Turns out...

Defeating a Tamper-Proof Bottle
From Schneier on Security

Defeating a Tamper-Proof Bottle

Here's an interesting case of doctored urine-test samples from the Sochi Olympics. Evidence points to someone defeating the tamper-resistance of the bottles: Berlinger...

Friday Squid Blogging: Counterfeit Squid
From Schneier on Security

Friday Squid Blogging: Counterfeit Squid

Goya is facing a $5 million lawsuit; the plaintiff is claiming its canned octopus is really squid. As usual, you can also use this squid post to talk about the...

Scam or Satire?
From Schneier on Security

Scam or Satire?

You decide....

More on the Going Dark Debate
From Schneier on Security

More on the Going Dark Debate

Lawfare is turning out to be the go-to blog for policy wonks about various government debates on cybersecurity. There are two good posts this week on the Going...

Hacking Gesture-Based Security
From Schneier on Security

Hacking Gesture-Based Security

Interesting research: Abdul Serwadda, Vir V. Phoha, Zibo Wang, Rajesh Kumar, and Diksha Shukla, "Robotic Robbery on the Touch Screen," ACM Transactions on Information...

FTC Investigating Android Patching Practices
From Schneier on Security

FTC Investigating Android Patching Practices

It's a known truth that most Android vulnerabilities don't get patched. It's not Google's fault. They release the patches, but the phone carriers don't push them...

New Credit Card Scam
From Schneier on Security

New Credit Card Scam

A criminal ring was arrested in Malaysia for credit card fraud: They would visit the online shopping websites and purchase all their items using phony credit card...

Children of Spies
From Schneier on Security

Children of Spies

Fascinating story of Tim and Alex Foley, the children of Russian spies Donald Heathfield and Tracey Foley....
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account