acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorBruce Schneier
bg-corner

Friday Squid Blogging: Little Squid
From Schneier on Security

Friday Squid Blogging: Little Squid

Beautiful photo. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Hacking Team Documentation
From Schneier on Security

Hacking Team Documentation

The Intercept has published the complete manuals for Hacking Team's attack software. This follows a detailed report on Hacking Team's products from August. Hacking...

Enigma Simulator
From Schneier on Security

Enigma Simulator

Good article, with pictures, diagrams, and code....

The Risk of Unfounded Ebola Fears
From Schneier on Security

The Risk of Unfounded Ebola Fears

Good essay. Worry about Ebola (or anything) manifests physically as what's known as a fight, flight, or freeze response. Biological systems ramp up or down to focus...

Adobe Book Reader Surveillance
From Schneier on Security

Adobe Book Reader Surveillance

Details. Confirmation....

FDA Guidance on Medical Device Cybersecurity
From Schneier on Security

FDA Guidance on Medical Device Cybersecurity

The Food and Drug Administration has released guidelines regarding the security of medical devices. I admit that I have not read it....

Survey on What Americans Fear
From Schneier on Security

Survey on What Americans Fear

Interesting data: Turning to the crime section of the Chapman Survey on American Fears, the team discovered findings that not only surprised them, but also those...

Apple Copies Your Files Without Your Knowledge or Consent
From Schneier on Security

Apple Copies Your Files Without Your Knowledge or Consent

The latest version of Apple's OS automatically syncs your files to iCloud Drive, even files you choose to store locally. Apple encrypts your data, both in transit...

US Intelligence "Second Leaker" Identified
From Schneier on Security

US Intelligence "Second Leaker" Identified

There's a report that the FBI has identified a second leaker: The case in question involves an Aug. 5 story published by The Intercept, an investigative website...

Authentication Attack Against Credit Card Verification
From Schneier on Security

Authentication Attack Against Credit Card Verification

Here's a physical attack against a credit card verification system. Basically, the attack disrupts the communications between the retail terminal and the system...

Spritz: A New RC4-Like Stream Cipher
From Schneier on Security

Spritz: A New RC4-Like Stream Cipher

Last week, Ron Rivest gave a talk at MIT about Spritz, a new stream cipher by him and Jacob Schuldt. It's basically a redesign of RC4, given current cryptographic...

Friday Squid Blogging: Humboldt Squids Attack Submarine
From Schneier on Security

Friday Squid Blogging: Humboldt Squids Attack Submarine

A pair of Humboldt squids attacked a Greenpeace submarine. There's video. As usual, you can also use this squid post to talk about the security stories in the news...

The Ineffectiveness of Sealing the Border Against Ebola (and Other Viruses)
From Schneier on Security

The Ineffectiveness of Sealing the Border Against Ebola (and Other Viruses)

Good analysis....

Analysis of Printer Watermarking Techniques
From Schneier on Security

Analysis of Printer Watermarking Techniques

Interesting paper: Maya Embar, Louis M. McHough IV, and William R. Wesselman, "Printer watermark obfuscation," Proceeding RIIT '14: Proceedings of the 3rd annual...

The NSA's Role in Commercial Cybersecurity
From Schneier on Security

The NSA's Role in Commercial Cybersecurity

Susan Landau has a new paper on the NSA's increasing role in commercial cybersecurity. She argues that the NSA is the wrong organization to do this, and we need...

Jumping Air Gaps with All-in-One Printers
From Schneier on Security

Jumping Air Gaps with All-in-One Printers

Last week, Adi Shamir gave a presentation at Black Hat Europe on using all-in-one printers to control computers on the other side of air gaps. There's no paper...

Deanonymizing Taxi Passenger and Fare Data
From Schneier on Security

Deanonymizing Taxi Passenger and Fare Data

Interesting essay on the sorts of things you can learn from anonymized taxi passenger and fare data....

Whisper Tracks Users
From Schneier on Security

Whisper Tracks Users

The Guardian has reported that the app Whisper tracks users, and then published a second article explaining what it knows after Whisper denied the story. Here's...

More Crypto Wars II
From Schneier on Security

More Crypto Wars II

FBI Director James Comey again called for an end to secure encryption by putting in a backdoor. Here's his speech: There is a misconception that building a lawful...

How Did the Feds Identity Dread Pirate Roberts?
From Schneier on Security

How Did the Feds Identity Dread Pirate Roberts?

Last month, I wrote that the FBI identified Ross W. Ulbricht as the Silk Road's Dread Pirate Roberts through a leaky CAPTCHA. Seems that story doesn't hold water...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account