acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorBruce Schneier
bg-corner

Michael Chertoff Speaks Out Against Backdoors
From Schneier on Security

Michael Chertoff Speaks Out Against Backdoors

This is significant....

Hacking Team's Purchasing of Zero-Day Vulnerabilities
From Schneier on Security

Hacking Team's Purchasing of Zero-Day Vulnerabilities

This is an interesting article that looks at Hacking Team's purchasing of zero-day (0day) vulnerabilities from a variety of sources: Hacking Team's relationships...

Friday Squid Blogging: How a Squid Changes Color
From Schneier on Security

Friday Squid Blogging: How a Squid Changes Color

The California market squid, Doryteuthis opalescens, can manipulate its color in a variety of ways: Reflectins are aptly-named proteins unique to the light-sensing...

How an Amazon Worker Stole iPads
From Schneier on Security

How an Amazon Worker Stole iPads

A worker in Amazon's packaging department figured out how to deliver electronics to himself: Since he was employed with the packaging department, he had easy access...

Remotely Hacking a Car While It's Driving
From Schneier on Security

Remotely Hacking a Car While It's Driving

This is a big deal. Hackers can remotely hack the Uconnect system in cars just by knowing the car's IP address. They can disable the brakes, turn on the AC, blast...

Organizational Doxing of Ashley Madison
From Schneier on Security

Organizational Doxing of Ashley Madison

The -- depending on who is doing the reporting -- cheating, affair, adultery, or infidelity site Ashley Madison has been hacked. The hackers are threatening to...

Malcolm Gladwell on Competing Security Models
From Schneier on Security

Malcolm Gladwell on Competing Security Models

In this essay/review of a book on UK intelligence officer and Soviet spy Kim Philby, Malcolm Gladwell makes this interesting observation: Here we have two very...

Preventing Book Theft in the Middle Ages
From Schneier on Security

Preventing Book Theft in the Middle Ages

Interesting article....

Google's Unguessable URLs
From Schneier on Security

Google's Unguessable URLs

Google secures photos using public but unguessable URLs: So why is that public URL more secure than it looks? The short answer is that the URL is working as a password...

Friday Squid Blogging: Squid Giving Birth
From Schneier on Security

Friday Squid Blogging: Squid Giving Birth

I may have posted this short video before, but if I did, I can't find it. It's four years old, but still pretty to watch. As usual, you can also use this squid...

Using Secure Chat
From Schneier on Security

Using Secure Chat

Micah Lee has a good tutorial on installing and using secure chat. To recap: We have installed Orbot and connected to the Tor network on Android, and we have installed...

ProxyHam Canceled
From Schneier on Security

ProxyHam Canceled

The ProxyHam project (and associated Def Con talk) has been canceled under mysterious circumstances. No one seems to know anything, and conspiracy theories abound...

Crypto-Gram Is Moving
From Schneier on Security

Crypto-Gram Is Moving

If you subscribe to my monthly e-mail newsletter, Crypto-Gram, you need to read this. Sometime between now and the August issue, the Crypto-Gram mailing list will...

Human and Technology Failures in Nuclear Facilities
From Schneier on Security

Human and Technology Failures in Nuclear Facilities

This is interesting: We can learn a lot about the potential for safety failures at US nuclear plants from the July 29, 2012, incident in which three religious activists...

NSA Antennas
From Schneier on Security

NSA Antennas

Interesting article on the NSA's use of multi-beam antennas for surveillance. Certainly smart technology; it can eavesdrop on multiple targets per antenna. I'm...

Friday Squid Blogging: My Little Cephalopod
From Schneier on Security

Friday Squid Blogging: My Little Cephalopod

A cute series of knitted plushies. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

High-tech Cheating on Exams
From Schneier on Security

High-tech Cheating on Exams

India is cracking down on people who use technology to cheat on exams: Candidates have been told to wear light clothes with half-sleeves, and shirts that do not...

Organizational Doxing
From Schneier on Security

Organizational Doxing

Recently, WikiLeaks began publishing over half a million previously secret cables and other documents from the Foreign Ministry of Saudi Arabia. It's a huge trove...

The Risks of Mandating Back Doors in Encryption Products
From Schneier on Security

The Risks of Mandating Back Doors in Encryption Products

Monday a group of cryptographers and security experts released a major paper outlining the risks of government-mandated back-doors in encryption products: Keys...

Amazon Is Analyzing the Personal Relationships of Its Reviewers
From Schneier on Security

Amazon Is Analyzing the Personal Relationships of Its Reviewers

This is an interesting story of a reviewer who had her reviewer deleted because Amazon believed she knew the author personally. Leaving completely aside the ethics...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account