acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorBruce Schneier
bg-corner

Attack Against DNS Root Servers
From Schneier on Security

Attack Against DNS Root Servers

Has anyone been following the attack against the DNS root servers two weeks ago? Details. I can't precisely explain why, but this feels like someone testing an...

"Security Theater" Sighting
From Schneier on Security

"Security Theater" Sighting

In a Schlock Mercenary comic....

Good Swatting Story
From Schneier on Security

Good Swatting Story

The New York Times Magazine has a good story about swatting, centering around a Canadian teenager who did it over a hundred times....

Friday Squid Blogging: Rare Octopus Squid Video from Hawaii
From Schneier on Security

Friday Squid Blogging: Rare Octopus Squid Video from Hawaii

Neat: While the Dana octopus squid may lack a squid's trademark trailing tentacles, it makes up for them in spectacular lighting equipment, with two of its muscular...

Resilient Systems News: End-of-Year Trends Webinar
From Schneier on Security

Resilient Systems News: End-of-Year Trends Webinar

I'll be participating in an end-of-year trends and predictions webinar on Thursday, December 17, at 1:00 PM EST. Join me here. In other news, Resilient has joined...

Hit-and-Run Driver Arrested Because Car Reported Accident
From Schneier on Security

Hit-and-Run Driver Arrested Because Car Reported Accident

A Florida woman drove away after an accident, but her car automatically reported it anyway. She was arrested....

How People Learn about Computer Security
From Schneier on Security

How People Learn about Computer Security

Interesting research: "Identifying patterns in informal sources of security information," by Emilee Rader and Rick Wash, Journal of Cybersecurity, 1 Dec 2015. Abstract...

Terrifying Technologies
From Schneier on Security

Terrifying Technologies

I've written about the difference between risk perception and risk reality. I thought about that when reading this list of Americans' top technology fears: Cyberterrorism...

How Israel Regulates Encryption
From Schneier on Security

How Israel Regulates Encryption

Interesting essay about how Israel regulates encryption: ...the Israeli encryption control mechanisms operate without directly legislating any form of encryption...

Forced Authorization Attacks Against Chip-and-Pin Credit Card Terminals
From Schneier on Security

Forced Authorization Attacks Against Chip-and-Pin Credit Card Terminals

Clever: The way forced authorisation fraud works is that the retailer sets up the terminal for a transaction by inserting the customer's card and entering the amount...

Friday Squid Blogging: North Korean Squid Fisherman Found Dead in Boats
From Schneier on Security

Friday Squid Blogging: North Korean Squid Fisherman Found Dead in Boats

I don't know if you've been following the story of the boats full of corpses that have been found in Japanese waters: Over the past two months, at least 12 wooden...

BlackBerry Leaves Pakistan Rather Than Provide a Government Backdoor
From Schneier on Security

BlackBerry Leaves Pakistan Rather Than Provide a Government Backdoor

BlackBerry has chosen to shut down operations in Pakistan rather than provide the government with backdoor access to encrypted communications. Pakistan is a relatively...

The Moral Dimension of Cryptography
From Schneier on Security

The Moral Dimension of Cryptography

Phil Rogaway has written an excellent paper titled "The Moral Character of Cryptography Work." In it, he exhorts cryptographers to consider the morality of their...

Worldwide Cryptographic Products Survey: Edits and Additions Wanted
From Schneier on Security

Worldwide Cryptographic Products Survey: Edits and Additions Wanted

Back in September, I announced my intention to survey the world market of cryptographic products. The goal is to compile a list of both free and commercial encryption...

Security vs. Business Flexibility
From Schneier on Security

Security vs. Business Flexibility

This article demonstrates that security is less important than functionality. When asked about their preference if they needed to choose between IT security and...

Tracking Someone Using LifeLock
From Schneier on Security

Tracking Someone Using LifeLock

Someone opened a LifeLock account in his ex-wife's name, and used the service to track her bank accounts, credit cards, and other financial activities. The article...

A History of Privacy
From Schneier on Security

A History of Privacy

This New Yorker article traces the history of privacy from the mid 1800s to today: As a matter of historical analysis, the relationship between secrecy and privacy...

Cryptanalysis of Algebraic Eraser
From Schneier on Security

Cryptanalysis of Algebraic Eraser

Algebraic Eraser is a public-key key-agreement protocol that's patented and being pushed by a company for the Internet of Things, primarily because it is efficient...

Friday Squid Blogging: Squid Necklace
From Schneier on Security

Friday Squid Blogging: Squid Necklace

She's calling it an octopus, but it's a squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Data and Goliath in German
From Schneier on Security

Data and Goliath in German

The German edition of Data and Goliath has been published....
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account