acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorBruce Schneier
bg-corner

Buying an Online Reputation
From Schneier on Security

Buying an Online Reputation

The story of a reporter who set up a fake business and then bought Facebook fans, Twitter followers, and online reviews. It was surprisingly easy and cheap....

Bringing Frozen Liquids through Airport Security
From Schneier on Security

Bringing Frozen Liquids through Airport Security

Gizmodo reports that UK airport security confiscates frozen liquids: "He told me that it wasn't allowed so I asked under what grounds, given it is not a liquid....

SYNful Knock Attack Against Cisco Routers
From Schneier on Security

SYNful Knock Attack Against Cisco Routers

FireEye is reporting the discovery of persistent malware that compromises Cisco routers: While this attack could be possible on any router technology, in this case...

History of Hacktivism
From Schneier on Security

History of Hacktivism

Nice article by Dorothy Denning. Hacktivism emerged in the late 1980s at a time when hacking for fun and profit were becoming noticeable threats. Initially it took...

Friday Squid Blogging; Giant Squid Sculpture at Burning Man
From Schneier on Security

Friday Squid Blogging; Giant Squid Sculpture at Burning Man

It looks impressive, maybe 20-30 feet long: "I think this might be the coolest thing I have ever built," said Barry Crawford about his giant, metal squid that was...

Drone Speedboat
From Schneier on Security

Drone Speedboat

It's a thing....

Smart Watch that Monitors Typing
From Schneier on Security

Smart Watch that Monitors Typing

Here's a watch that monitors the movements of your hand and can guess what you're typing. Using the watch's built-in motion sensors, more specifically data from...

Two Security Companies Battling It Out over Disclosures
From Schneier on Security

Two Security Companies Battling It Out over Disclosures

Okay, this is weird. FireEye has gone to court to prevent ERNW from disclosing vulnerabilities in FireEye products. FireEye should know better. Here's FireEye's...

Self-Destructing Computer Chip
From Schneier on Security

Self-Destructing Computer Chip

The chip is built on glass: Shattering the glass is straightforward. When the proper circuit is toggled, a small resistor within the substrate heats up until the...

Anonymous Browsing at the Library
From Schneier on Security

Anonymous Browsing at the Library

A rural New Hampshire library decided to install Tor on their computers and allow anonymous Internet browsing. The Department of Homeland pressured them to stop...

Child Arrested Because Adults Are Stupid
From Schneier on Security

Child Arrested Because Adults Are Stupid

A Texas 9th-grader makes an electronic clock and brings it to school. Teachers immediately become stupid and call the police: The bell rang at least twice, he said...

Obama and the Security of the Waldorf Astoria Hotel
From Schneier on Security

Obama and the Security of the Waldorf Astoria Hotel

President Obama won't stay at the Waldorf Astoria Hotel in New York because of security concerns. The hotel "was bought last year by Chinese investors with deep...

Hacking Team, Computer Vulnerabilities, and the NSA
From Schneier on Security

Hacking Team, Computer Vulnerabilities, and the NSA

When the National Security Administration (NSA) -- or any government agency -- discovers a vulnerability in a popular computer system, should it disclose it or...

Security Cartoon
From Schneier on Security

Security Cartoon

"Security vs. privacy."...

Programming Errors Weaken bcrypt Hashes of Ashley Madison Passwords
From Schneier on Security

Programming Errors Weaken bcrypt Hashes of Ashley Madison Passwords

Ashley Madison encrypted users' passwords using the bcrypt function. It's a secure password-encryption function, but two implemention programming mistakes allows...

Friday Squid Blogging: The Chemistry of Squid Camouflage
From Schneier on Security

Friday Squid Blogging: The Chemistry of Squid Camouflage

Interesting research. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Wanted: Cryptography Products for Worldwide Survey
From Schneier on Security

Wanted: Cryptography Products for Worldwide Survey

In 1999, Lance Hoffman, David Balenson, and others published a survey of non-US cryptographic products. The point of the survey was to illustrate that there was...

Drone Self-Defense and the Law
From Schneier on Security

Drone Self-Defense and the Law

Last month, a Kentucky man shot down a drone that was hovering near his backyard. WDRB News reported that the camera drone's owners soon showed up at the home of...

Cheating News from the Chess World
From Schneier on Security

Cheating News from the Chess World

Chess player caught cheating at a tournament: I kept on looking at him. He was always sitting down, he never got up. It was very strange; we are taking about hours...

FBI and Apple's Encryption
From Schneier on Security

FBI and Apple's Encryption

The New York Times is reporting that Apple encryption is hampering an FBI investigation: In an investigation involving guns and drugs, the Justice Department obtained...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account