acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorBruce Schneier
bg-corner

Friday Squid Blogging: Calamari Ripieni Recipe
From Schneier on Security

Friday Squid Blogging: Calamari Ripieni Recipe

Nice and easy Calamari Ripieni recipe, along with general instructions on cooking squid: Tenderizing squid is as simple as pounding it flat -- if you're going to...

NSA Plans for a Post-Quantum World
From Schneier on Security

NSA Plans for a Post-Quantum World

Quantum computing is a novel way to build computers -- one that takes advantage of the quantum properties of particles to perform operations on data in a very different...

SS7 Phone-Switch Flaw Enabled Surveillance
From Schneier on Security

SS7 Phone-Switch Flaw Enabled Surveillance

Interesting: Remember that vulnerability in the SS7 inter-carrier network that lets hackers and spies track your cellphone virtually anywhere in the world? It's...

Snake-Oil Cryptography Competition
From Schneier on Security

Snake-Oil Cryptography Competition

Funny....

No-Fly List Uses Predictive Assessments
From Schneier on Security

No-Fly List Uses Predictive Assessments

The US government has admitted that it uses predictive assessments to put people on the no-fly list: In a little-noticed filing before an Oregon federal judge,...

Nasty Cisco Attack
From Schneier on Security

Nasty Cisco Attack

This is serious: Cisco Systems officials are warning customers of a series of attacks that completely hijack critical networking gear by swapping out the valid...

AVA: A Social Engineering Vulnerability Scanner
From Schneier on Security

AVA: A Social Engineering Vulnerability Scanner

This is interesting: First, it integrates with corporate directories such as Active Directory and social media sites like LinkedIn to map the connections between...

Did Kaspersky Fake Malware?
From Schneier on Security

Did Kaspersky Fake Malware?

Two former Kaspersky employees have accused the company of faking malware to harm rival antivirus products. They would falsely classify legitimate files as malicious...

More  on Mail Cover
From Schneier on Security

More on Mail Cover

I've previously written about mail cover -- the practice of recording the data on mail envelopes. Sai has been covering the issue in more detail, and recently received...

Data and Goliath Confiscated from Chelsea Manning
From Schneier on Security

Data and Goliath Confiscated from Chelsea Manning

One of the books confiscated from Chelsea Manning was a copy of Data and Goliath....

Oracle CSO Rant Against Security Experts
From Schneier on Security

Oracle CSO Rant Against Security Experts

Oracle's CSO Mary Ann Davidson wrote a blog post ranting against security experts finding vulnerabilities in her company's products. The blog post has been taken...

NSA's Partnership with AT&T
From Schneier on Security

NSA's Partnership with AT&T

There's a new article, published jointly by The New York Times and ProPublica, aboutNSA's longstanding relationship with AT&T. It's based on the Snowden documents...

Friday Squid Blogging: Strawberry Squid
From Schneier on Security

Friday Squid Blogging: Strawberry Squid

I think it's a very pretty creature with some impressive adaptations. As usual, you can also use this squid post to talk about the security stories in the news...

Algorithmic Bias
From Schneier on Security

Algorithmic Bias

Good Q&A with Cynthia Dwork on algorithmic bias....

Cryptography from the 13th Century
From Schneier on Security

Cryptography from the 13th Century

The British Museum wants help breaking a code on a 13th-century sword....

Cosa Nostra Dead Drops
From Schneier on Security

Cosa Nostra Dead Drops

Good operational security is hard, and often uses manual technologies: Investigators described how Messina Denaro, 53, disdains telecommunications and relies on...

Another Salvo in the Second Crypto War (of Words)
From Schneier on Security

Another Salvo in the Second Crypto War (of Words)

Prosecutors from New York, London, Paris, and Madrid wrote an op-ed in yesterday's New York Times in favor of backdoors in cell phone encryption. There are a number...

Intimidating Military Personnel by Targeting Their Families
From Schneier on Security

Intimidating Military Personnel by Targeting Their Families

This FBI alert is interesting: (U//FOUO) In May 2015, the wife of a US military member was approached in front of her home by two Middle-Eastern males. The men...

Incenting Drug Dealers to Snitch on Each Other
From Schneier on Security

Incenting Drug Dealers to Snitch on Each Other

Local police are trying to convince drug dealers to turn each other in by pointing out that it reduces competition. It's a comical tactic with serious results:...

Detecting Betrayal in Diplomacy Games
From Schneier on Security

Detecting Betrayal in Diplomacy Games

Interesting research detecting betrayal in the game of Diplomacy by analyzing interplayer messages. One harbinger was a shift in politeness. Players who were excessively...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account