acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorBruce Schneier
bg-corner

Microsoft's Brad Smith on the Collapse of Safe Harbor
From Schneier on Security

Microsoft's Brad Smith on the Collapse of Safe Harbor

Microsoft's President Brad Smith has a blog post discussing what to do now that the US-EU safe-harbor agreement has collapsed. He outlines four steps: First, we...

Friday Squid Blogging: Squid Bed Sheets
From Schneier on Security

Friday Squid Blogging: Squid Bed Sheets

Some nice options....

Forensic Analysis of Smart Card Fraud
From Schneier on Security

Forensic Analysis of Smart Card Fraud

This paper describes what is almost certainly the most sophisticated chip-and-pin credit card fraud to date. News article. BoingBoing post....

Hacking Fitbit
From Schneier on Security

Hacking Fitbit

This is impressive: "An attacker sends an infected packet to a fitness tracker nearby at bluetooth distance then the rest of the attack occurs by itself, without...

Police Want Genetic Data from Corporate Repositories
From Schneier on Security

Police Want Genetic Data from Corporate Repositories

Both the FBI and local law enforcement are trying to get the genetic data stored at companies like 23andMe. No surprise, really. As NYU law professor Erin Murphy...

Forgotten Passwords
From Schneier on Security

Forgotten Passwords

Funny monologue....

Security Risks of Unpatched Android Software
From Schneier on Security

Security Risks of Unpatched Android Software

A lot has been written about the security vulnerability resulting from outdated and unpatched Android software. The basic problem is that while Google regularly...

How to Commandeer a Store PA System
From Schneier on Security

How to Commandeer a Store PA System

If you call the proper phone extension, you have complete control over the public address system at a Target store....

Friday Squid Blogging: Squid Photos
From Schneier on Security

Friday Squid Blogging: Squid Photos

"Terrifying" squid photos. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Mapping FinFisher Users
From Schneier on Security

Mapping FinFisher Users

Citizen Lab continues to do excellent work exposing the world's cyber-weapons arms manufacturers. Its latest report attempts to track users of Gamma International's...

Breaking Diffie-Hellman with Massive Precomputation (Again)
From Schneier on Security

Breaking Diffie-Hellman with Massive Precomputation (Again)

The Internet is abuzz with this blog post and paper, speculating that the NSA is breaking the Diffie-Hellman key-exchange protocol in the wild through massive precomputation...

Problems with DNA Evidence
From Schneier on Security

Problems with DNA Evidence

Turns out it's fallible....

On Cyber Arms Control Treaties
From Schneier on Security

On Cyber Arms Control Treaties

Good op-ed....

Obama Administration Not Pursuing a Backdoor to Commercial Encryption
From Schneier on Security

Obama Administration Not Pursuing a Backdoor to Commercial Encryption

The Obama Administration is not pursuing a law that would force computer and communications manufacturers to add backdoors to their products for law enforcement...

Jamming Wi-Fi
From Schneier on Security

Jamming Wi-Fi

It's both easy and cheap. Slashdot thread....

Soviet Spying on US Selectric Typewriters
From Schneier on Security

Soviet Spying on US Selectric Typewriters

In the 19980s, the Soviet Union bugged the IBM Selectric typewriters in the U.S. Embassy in Moscow. This NSA document discusses how the US discovered the bugs and...

NSA Patents
From Schneier on Security

NSA Patents

Details on the patents issued to the NSA....

Friday Squid Blogging: Japanese Squid Recipe
From Schneier on Security

Friday Squid Blogging: Japanese Squid Recipe

Delicious recipe of squid with cabbage, bean sprouts, and noodles. As usual, you can also use this squid post to talk about the security stories in the news that...

I'm a Guest on "Adam Ruins Everything"
From Schneier on Security

I'm a Guest on "Adam Ruins Everything"

The show is about security theater. I am a disembodied head on a scooter. Here's a teaser. Here's the full episode (for pay, but cheap). The scooter idea was a...

SHA-1 Freestart Collision
From Schneier on Security

SHA-1 Freestart Collision

There's a new cryptanalysis result against the hash function SHA-1: Abstract: We present in this article a freestart collision example for SHA-1, i.e., a collision...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account