acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorBruce Schneier
bg-corner

Understanding the Organizational Failures of Terrorist Organizations
From Schneier on Security

Understanding the Organizational Failures of Terrorist Organizations

New research: Max Abrahms and Philip B.K. Potter, "Explaining Terrorism: Leadership Deficits and Militant Group Tactics," International Organizations. Abstract:...

How We Become Habituated to Security Warnings on Computers
From Schneier on Security

How We Become Habituated to Security Warnings on Computers

New research: "How Polymorphic Warnings Reduce Habituation in the Brain ­- Insights from an fMRI Study." Abstract: Research on security warnings consistently points...

Friday Squid Blogging: Squid Stir-Fry
From Schneier on Security

Friday Squid Blogging: Squid Stir-Fry

Spicy squid masala stir-fry. Easy and delicious. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered...

How the CIA Might Target Apple's XCode
From Schneier on Security

How the CIA Might Target Apple's XCode

The Intercept recently posted a story on the CIA's attempts to hack the iOS operating system. Most interesting was the speculation that it hacked XCode, which would...

Threats to Information Integrity
From Schneier on Security

Threats to Information Integrity

Every year, the Director of National Intelligence publishes an unclassified "Worldwide Threat Assessment." This year's report was published two weeks ago. "Cyber"...

Details on Hacking Team Software Used by Ethiopian Government
From Schneier on Security

Details on Hacking Team Software Used by Ethiopian Government

The Citizen Lab at the University of Toronto published a new report on the use of spyware from the Italian cyberweapons arms manufacturer Hacking Team by the Ethiopian...

Fall Seminar on Catastrophic Risk
From Schneier on Security

Fall Seminar on Catastrophic Risk

I am planning a study group at Harvard University (in Boston) for the Fall semester, on catastrophic risk. Berkman Study Group -- Catastrophic Risk: Technologies...

Data and Goliath Makes New York Times Best-Seller List
From Schneier on Security

Data and Goliath Makes New York Times Best-Seller List

The March 22 best-seller list from the New York Times will list me as #6 in the hardcover nonfiction category, and #13 in the combined paper/e-book category. This...

The Changing Economics of Surveillance
From Schneier on Security

The Changing Economics of Surveillance

Cory Doctorow examines the changing economics of surveillance and what it means: The Stasi employed one snitch for every 50 or 60 people it watched. We can't be...

Equation Group Update
From Schneier on Security

Equation Group Update

More information about the Equation Group, aka the NSA. Kaspersky Labs has published more information about the Equation Group -- that's the NSA -- and its sophisticated...

Hardware Bit-Flipping Attack
From Schneier on Security

Hardware Bit-Flipping Attack

The Project Zero team at Google has posted details of a new attack that targets a computer's' DRAM. It's called Rowhammer. Here's a good description: Here's how...

Can the NSA Break Microsoft's BitLocker?
From Schneier on Security

Can the NSA Break Microsoft's BitLocker?

The Intercept has a new story on the CIA's -- yes, the CIA, not the NSA -- efforts to break encryption. These are from the Snowden documents, and talk about a conference...

Geotagging Twitter Users by Mining Their Social Graphs
From Schneier on Security

Geotagging Twitter Users by Mining Their Social Graphs

New research: Geotagging One Hundred Million Twitter Accounts with Total Variation Minimization," by Ryan Compton, David Jurgens, and David Allen. Abstract: Geographically...

Identifying When Someone is Operating a Computer Remotely
From Schneier on Security

Identifying When Someone is Operating a Computer Remotely

Here's an interesting technique to detect Remote Access Trojans, or RATS: differences in how local and remote users use the keyboard and mouse: By using biometric...

Attack Attribution and Cyber Conflict
From Schneier on Security

Attack Attribution and Cyber Conflict

The vigorous debate after the Sony Pictures breach pitted the Obama administration against many of us in the cybersecurity community who didn't buy Washington's...

Friday Squid Blogging: Biodegradable Thermoplastic Inspired by Squid Teeth
From Schneier on Security

Friday Squid Blogging: Biodegradable Thermoplastic Inspired by Squid Teeth

There's a new 3D-printable biodegradable thermoplastic: Pennsylvania State University researchers have synthesized a biodegradable thermoplastic that can be used...

Data and Goliath's Big Idea
From Schneier on Security

Data and Goliath's Big Idea

Data and Goliath is a book about surveillance, both government and corporate. It's an exploration in three parts: what's happening, why it matters, and what to...

FREAK: Security Rollback Attack Against SSL
From Schneier on Security

FREAK: Security Rollback Attack Against SSL

This week we learned about an attack called "FREAK" -- "Factoring Attack on RSA-EXPORT Keys" -- that can break the encryption of many websites. Basically, some...

The TSA's FAST Personality Screening Program Violates the Fourth Amendment
From Schneier on Security

The TSA's FAST Personality Screening Program Violates the Fourth Amendment

New law journal article: "A Slow March Towards Thought Crime: How the Department of Homeland Security's FAST Program Violates the Fourth Amendment," by Christopher...

Now Corporate Drones are Spying on Cell Phones
From Schneier on Security

Now Corporate Drones are Spying on Cell Phones

The marketing firm Adnear is using drones to track cell phone users: The capture does not involve conversations or personally identifiable information, according...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account