acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorBruce Schneier
bg-corner

TSA Master Keys
From Schneier on Security

TSA Master Keys

Someone recently noticed a Washington Post story on the TSA that originally contained a detailed photograph of all the TSA master keys. It's now blurred out of...

Glenn Greenwald Debates Keith Alexander
From Schneier on Security

Glenn Greenwald Debates Keith Alexander

Interesting debate, surprisingly civil. Alexander seemed to have been okay with Snowden revealing surveillance based on Section 215: "If he had taken the one court...

Understanding Squid Self-Healing Teeth
From Schneier on Security

Understanding Squid Self-Healing Teeth

Using squid teeth as a model, researchers have created "the first material that heals itself in water." Paper from Nature. As usual, you can also use this squid...

I'll be Talking Cyber-Resilience on a Webinar
From Schneier on Security

I'll be Talking Cyber-Resilience on a Webinar

This coming Thursday, I'll be talking with Larry Poneman about cyber-resilience and the results of a new survey he's releasing. Join us here. The event is sponsored...

China's "Great Cannon"
From Schneier on Security

China's "Great Cannon"

Interesting research: "An Analysis of China's 'Great Cannon.'" Abstract: On March 16th, 2015, the Chinese censorship apparatus employed a new tool, the "Great Cannon"...

"The Declining Half-Life of Secrets"
From Schneier on Security

"The Declining Half-Life of Secrets"

Several times I've mentioned Peter Swire's concept of "the declining half-life of secrets." He's finally written it up: The nature of secrets is changing. Secrets...

History of the L0pht
From Schneier on Security

History of the L0pht

This Washington Post article uses the history of the L0pht to talk about the broader issues of Internet security....

What Can you Learn from Metadata?
From Schneier on Security

What Can you Learn from Metadata?

An Australian reporter for the ABC, Will Ockenden published a bunch of his metadata, and asked people to derive various elements of his life. They did pretty well...

Using Samsung's Internet-Enabled Refrigerator for Man-in-the-Middle Attacks
From Schneier on Security

Using Samsung's Internet-Enabled Refrigerator for Man-in-the-Middle Attacks

This is interesting research:: Whilst the fridge implements SSL, it FAILS to validate SSL certificates, thereby enabling man-in-the-middle attacks against most...

Friday Squid Blogging: Cephalopod Anatomy Class
From Schneier on Security

Friday Squid Blogging: Cephalopod Anatomy Class

Beautiful diorama. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Mickens on Security
From Schneier on Security

Mickens on Security

James Mickens, for your amusement. A somewhat random sample: My point is that security people need to get their priorities straight. The "threat model" section...

The Benefits of Endpoint Encryption
From Schneier on Security

The Benefits of Endpoint Encryption

An unofficial blog post from FTC chief technologist Ashkan Soltani on the virtues of strong end-user device controls....

German BfV - NSA Cooperation
From Schneier on Security

German BfV - NSA Cooperation

The German newspaper Zeit is reporting the BfV, Germany's national intelligence agency, (probably) illegally traded data about Germans to the NSA in exchange for...

Iranian Phishing
From Schneier on Security

Iranian Phishing

CitizenLab is reporting on Iranian hacking attempts against activists, which include a real-time man-in-the-middle attack against Google's two-factor authentication...

Defending All the Targets Is Impossible
From Schneier on Security

Defending All the Targets Is Impossible

In the wake of the recent averted mass shooting on the French railroads, officials are realizing that there are just too many potential targets to defend. The sheer...

Regularities in Android Lock Patterns
From Schneier on Security

Regularities in Android Lock Patterns

Interesting: Marte Løge, a 2015 graduate of the Norwegian University of Science and Technology, recently collected and analyzed almost 4,000 ALPs as part of her...

Movie Plot Threat: Terrorists Attacking US Prisons
From Schneier on Security

Movie Plot Threat: Terrorists Attacking US Prisons

Kansas Senator Pat Roberts wins an award for his movie-plot threat: terrorists attacking the maximum-security federal prison at Ft. Leavenworth: In an Aug. 14 letter...

Are Data Breaches Getting Larger?
From Schneier on Security

Are Data Breaches Getting Larger?

This research says that data breaches are not getting larger over time. "Hype and Heavy Tails: A Closer Look at Data Breaches," by Benjamin Edwards, Steven Hofmeyr...

Heartbeat as a Biometric
From Schneier on Security

Heartbeat as a Biometric

Yet another biometric: your heartbeat....

The Advertising Value of Intrusive Tracking
From Schneier on Security

The Advertising Value of Intrusive Tracking

Here's an interesting research paper that tries to calculate the differential value of privacy-invasive advertising practices. The researchers used data from a...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account