acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorBruce Schneier
bg-corner

Data Is a Toxic Asset
From Schneier on Security

Data Is a Toxic Asset

Thefts of personal information aren't unusual. Every week, thieves break into networks and steal data about people, often tens of millions at a time. Most of the...

DROWN Attack
From Schneier on Security

DROWN Attack

Earlier this week, we learned of yet another attack against SSL/TLS where an attacker can force people to use insecure algorithms. It's called DROWN. Here's a good...

Security Vulnerabilities in Wireless Keyboards
From Schneier on Security

Security Vulnerabilities in Wireless Keyboards

Many wireless keyboards have a security vulnerability that allow someone to hack the computer using the keyboard-computer link. (Technical details here.) An attacker...

The Mathematics of Conspiracy
From Schneier on Security

The Mathematics of Conspiracy

This interesting study tries to build a mathematical model for the continued secrecy of conspiracies, and tries to predict how long before they will be revealed...

Company Tracks Iowa Caucusgoers by their Cell Phones
From Schneier on Security

Company Tracks Iowa Caucusgoers by their Cell Phones

It's not just governments. Companies like Dstillery are doing this too: "We watched each of the caucus locations for each party and we collected mobile device ID's...

WikiLeaks Publishes NSA Target List
From Schneier on Security

WikiLeaks Publishes NSA Target List

As part of an ongoing series of classified NSA target list and raw intercepts, WikiLeaks published details of the NSA's spying on UN Secretary General Ban Ki-Moon...

Lots More Writing about the FBI vs. Apple
From Schneier on Security

Lots More Writing about the FBI vs. Apple

I have written two posts on the case, and at the bottom of those essays are lots of links to other essays written by other people. Here are more links. If you read...

Resilient Systems News: IBM to Buy Resilient Systems
From Schneier on Security

Resilient Systems News: IBM to Buy Resilient Systems

Today, IBM announced its intention to purchase my company, Resilient Systems. (Yes, the rumors were basically true.) I think this is a great development for Resilient...

More on the "Data as Exhaust" Metaphor
From Schneier on Security

More on the "Data as Exhaust" Metaphor

Research paper: Gavin J.D. Smith, "Surveillance, Data and Embodiment: On the Work of Being Watched," Body and Society, January 2016. Abstract: Today's bodies are...

Friday Squid Blogging: Energy Converter Inspired by Squid
From Schneier on Security

Friday Squid Blogging: Energy Converter Inspired by Squid

Engineers have invented a wave energy converter that works in the same way that squid propel themselves through the water. As usual, you can also use this squid...

Notice and Consent
From Schneier on Security

Notice and Consent

New Research: Rebecca Lipman, "Online Privacy and the Invisible Market for Our Data." The paper argues that notice and consent doesn't work, and suggests how is...

Thinking about Intimate Surveillance
From Schneier on Security

Thinking about Intimate Surveillance

Law Professor Karen Levy writes about the rise of surveillance in our most intimate activities -- love, sex, romance -- and how it affects those activities. This...

Simultaneous Discovery of Vulnerabilities
From Schneier on Security

Simultaneous Discovery of Vulnerabilities

In the conversation about zero-day vulnerabilities and whether "good" governments should disclose or hoard vulnerabilities, one of the critical variables is independent...

The Importance of Strong Encryption to Security
From Schneier on Security

The Importance of Strong Encryption to Security

Encryption keeps you safe. Encryption protects your financial details and passwords when you bank online. It protects your cell phone conversations from eavesdroppers...

Eavesdropping by the Foscam Security Camera
From Schneier on Security

Eavesdropping by the Foscam Security Camera

Brian Krebs has a really weird story about the build-in eavesdropping by the Chinese-made Foscam security camera: Imagine buying an internet-enabled surveillance...

Research on Balancing Privacy with Surveillance
From Schneier on Security

Research on Balancing Privacy with Surveillance

Interesting research: Michael Kearns, Aaron Roth, Zhiewi Steven Wu, and Grigory Yaroslavtsev, "Private algorithms for the protected in social network search," PNAS...

The Ads vs. Ad Blockers Arms Race
From Schneier on Security

The Ads vs. Ad Blockers Arms Race

For the past month or so, Forbes has been blocking browsers with ad blockers. Today, I tried to access a Wired article and the site blocked me for the same reason...

Practical TEMPEST Attack
From Schneier on Security

Practical TEMPEST Attack

Four researchers have demonstrated a TEMPEST attack against a laptop, recovering its keys by listening to its electrical emanations. The cost for the attack hardware...

Security Vulnerability in gilbc DNS
From Schneier on Security

Security Vulnerability in gilbc DNS

It's a really bad one....

Decrypting an iPhone for the FBI
From Schneier on Security

Decrypting an iPhone for the FBI

Earlier this week, a federal magistrate ordered Apple to assist the FBI in hacking into the iPhone used by one of the San Bernardino shooters. Apple will fight...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account