acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorBruce Schneier
bg-corner

More on Hacking Team
From Schneier on Security

More on Hacking Team

Read this: Hacking Team asked its customers to shut down operations, but according to one of the leaked files, as part of Hacking Team's "crisis procedure," it...

More about the NSA's XKEYSCORE
From Schneier on Security

More about the NSA's XKEYSCORE

I've been reading through the 48 classified documents about the NSA's XKEYSCORE system released by the Intercept last week. From the article: The NSA's XKEYSCORE...

Hacking Team Is Hacked
From Schneier on Security

Hacking Team Is Hacked

Someone hacked the cyberweapons arms manufacturer Hacking Team and posted 400 GB of internal company data. Hacking Team is a pretty sleazy company, selling surveillance...

NSA German Intercepts
From Schneier on Security

NSA German Intercepts

On Friday, WikiLeaks published three summaries of NSA intercepts of German government communications. To me, the most interesting thing is not the intercept analyses...

Friday Squid Blogging: Squid Fishing in the Gulf of Thailand
From Schneier on Security

Friday Squid Blogging: Squid Fishing in the Gulf of Thailand

Long article about a very lucrative squid-fishing industry that involves bribing the Cambodian Navy. As usual, you can also use this squid post to talk about the...

Rabbit Beating Up Snake
From Schneier on Security

Rabbit Beating Up Snake

It's the Internet, which means there must be cute animal videos on this blog. But this one is different. Watch a mother rabbit beat up a snake to protect her children...

Clever System of Secure Distributed Computation
From Schneier on Security

Clever System of Secure Distributed Computation

This is really clever: Enigma's technique -- what cryptographers call "secure multiparty computation" -- works by mimicking a few of the features of bitcoin's decentralized...

Details of the NSA's XKEYSCORE
From Schneier on Security

Details of the NSA's XKEYSCORE

The Intercept has published a highly detailed two-part article on how the NSA's XKEYSCORE works, including a huge number of related documents from the Snowden archive...

Office of Personnel Management Data Hack
From Schneier on Security

Office of Personnel Management Data Hack

I don't have much to say about the recent hack of the US Office of Personnel Management, which has been attributed to China (and seems to be getting worse all the...

Twitter Followers: Please Use the Correct Feed
From Schneier on Security

Twitter Followers: Please Use the Correct Feed

The official Twitter feed for my blog is @schneierblog. The account @Bruce_Schneier also mirrors my blog, but it is not mine. I have nothing to do with it, and...

Tracking the Psychological Effects of the 9/11 Attacks
From Schneier on Security

Tracking the Psychological Effects of the 9/11 Attacks

Interesting research from 2012: "The Dynamics of Evolving Beliefs, Concerns, Emotions, and Behavioral Avoidance Following 9/11: A Longitudinal Analysis of Representative...

TEMPEST Attack
From Schneier on Security

TEMPEST Attack

There's a new paper on a low-cost TEMPEST attack against PC cryptography: We demonstrate the extraction of secret decryption keys from laptop computers, by nonintrusively...

Migrating from SHA-1 to SHA-2
From Schneier on Security

Migrating from SHA-1 to SHA-2

Here's a comprehensive document on migrating from SHA-1 to SHA-2 in Active Directory certificates....

Friday Squid Blogging: Classic Gary Larson Squid Cartoon
From Schneier on Security

Friday Squid Blogging: Classic Gary Larson Squid Cartoon

I have always liked this one. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Other GCHQ News from Snowden
From Schneier on Security

Other GCHQ News from Snowden

There are two other Snowden stories this week about GCHQ: one about its hacking practices, and the other about its propaganda and psychology research. The second...

NSA and GCHQ Attacked Antivirus Companies
From Schneier on Security

NSA and GCHQ Attacked Antivirus Companies

On Monday, the Intercept published a new story from the Snowden documents: The spy agencies have reverse engineered software products, sometimes under questionable...

Yet Another Leaker -- with the NSA's French Intercepts
From Schneier on Security

Yet Another Leaker -- with the NSA's French Intercepts

Wikileaks has published some NSA SIGINT documents describing intercepted French government communications. This seems not be from the Snowden documents. It could...

Baseball Hacking: Cardinals vs. Astros
From Schneier on Security

Baseball Hacking: Cardinals vs. Astros

I think this is the first case of one professional sports team hacking another. No idea if it was an official operation, or a couple of employees doing it on their...

What is the DoD's Position on Backdoors in Security Systems?
From Schneier on Security

What is the DoD's Position on Backdoors in Security Systems?

In May, Admiral James A. Winnefeld, Jr., vice-chairman of the Joint Chiefs of Staff, gave an address at the Joint Service Academies Cyber Security Summit at West...

Hayden Mocks NSA Reforms
From Schneier on Security

Hayden Mocks NSA Reforms

Former NSA Director Michael recently mocked the NSA reforms in the recently passed USA Freedom Act: If somebody would come up to me and say, "Look, Hayden, here's...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account