acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorBruce Schneier
bg-corner

Did North Korea Really Attack Sony?
From Schneier on Security

Did North Korea Really Attack Sony?

I am deeply skeptical of the FBI's announcement on Friday that North Korea was behind last month's Sony hack. The agency's evidence is tenuous, and I have a hard...

Manipulating Juries with PowerPoint
From Schneier on Security

Manipulating Juries with PowerPoint

Interesting article on the subconscious visual tricks used to manipulate juries and affect verdicts. In December 2012 the Washington Supreme Court threw out Glasmann's...

North Korea DDoSed Off the Internet
From Schneier on Security

North Korea DDoSed Off the Internet

North Korea has been knocked off the Internet by a distributed denial-of-service (DDoS) attack. Maybe the US did it, and maybe not. This whole incident is a perfect...

2008 Cyberattack Against Turkish Oil Pipeline
From Schneier on Security

2008 Cyberattack Against Turkish Oil Pipeline

Interesting article talks about the 2008 cyberattack against a Turkish oil pipeline: For western intelligence agencies, the blowout was a watershed event. Hackers...

Reacting to the Sony Hack
From Schneier on Security

Reacting to the Sony Hack

First we thought North Korea was behind the Sony cyberattacks. Then we thought it was a couple of hacker guys with an axe to grind. Now we think North Korea is...

Friday Squid Blogging: Squid Beard
From Schneier on Security

Friday Squid Blogging: Squid Beard

Impressive. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Lessons from the Sony Hack
From Schneier on Security

Lessons from the Sony Hack

Earlier this month, a mysterious group that calls itself Guardians of Peace hacked into Sony Pictures Entertainment's computer systems and began revealing many...

SS7 Vulnerabilities
From Schneier on Security

SS7 Vulnerabilities

There are security vulnerability in the phone-call routing protocol called SS7. The flaws discovered by the German researchers are actually functions built into...

ISIS Cyberattacks
From Schneier on Security

ISIS Cyberattacks

Citizen Lab has a new report on a probable ISIS-launched cyberattack: This report describes a malware attack with circumstantial links to the Islamic State in Iraq...

The Limits of Police Subterfuge
From Schneier on Security

The Limits of Police Subterfuge

"The next time you call for assistance because the Internet service in your home is not working, the 'technician' who comes to your door may actually be an undercover...

How the FBI Unmasked Tor Users
From Schneier on Security

How the FBI Unmasked Tor Users

Kevin Poulson has a good article up on Wired about how the FBI used a Metasploit variant to identity Tor users....

Fake Cell Towers Found in Norway
From Schneier on Security

Fake Cell Towers Found in Norway

In yet another example of what happens when you build an insecure communications infrastructure, fake cell phone towers have been found in Oslo. No one knows who...

Understanding Zero-Knowledge Proofs
From Schneier on Security

Understanding Zero-Knowledge Proofs

Matthew Green has a good primer....

Over 700 Million People Taking Steps to Avoid NSA Surveillance
From Schneier on Security

Over 700 Million People Taking Steps to Avoid NSA Surveillance

There's a new international survey on Internet security and trust, of "23,376 Internet users in 24 countries," including "Australia, Brazil, Canada, China, Egypt...

Friday Squid Blogging: Recreational Squid Fishing in Washington State
From Schneier on Security

Friday Squid Blogging: Recreational Squid Fishing in Washington State

There is year-round recreational squid fishing from the Strait of Juan de Fuca to south Puget Sound. A nighttime sport that requires simple, inexpensive fishing...

Incident Response Webinar on Thursday
From Schneier on Security

Incident Response Webinar on Thursday

On 12/18 I'll be part of a Co3 webinar where we examine incident-response trends of 2014 and look ahead to 2015. I tend not to do these, but this is an exception...

Who Might Control Your Telephone Metadata
From Schneier on Security

Who Might Control Your Telephone Metadata

Remember last winter when President Obama called for an end to the NSA's telephone metadata collection program? He didn't actually call for an end to it; he just...

Comments on the Sony Hack
From Schneier on Security

Comments on the Sony Hack

I don't have a lot to say about the Sony hack, which seems to still be ongoing. I want to highlight a few points, though. At this point, the attacks seem to be...

Not Enough CISOs to Go Around
From Schneier on Security

Not Enough CISOs to Go Around

This article is reporting that the demand for Chief Information Security Officers far exceeds supply: Sony and every other company that realizes the need for a...

Effects of Terrorism Fears
From Schneier on Security

Effects of Terrorism Fears

Interesting article: "How terrorism fears are transforming America's public space." I am reminded of my essay from four years ago: "Close the Washington Monument...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account