acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorBruce Schneier
bg-corner

Security of the SHA Family of Hash Functions
From Schneier on Security

Security of the SHA Family of Hash Functions

Good article on the insecurity of SHA-1 and the need to replace it sooner rather than later....

Friday Squid Blogging: 200-Pound Squid Found in Gulf of Mexico
From Schneier on Security

Friday Squid Blogging: 200-Pound Squid Found in Gulf of Mexico

A 200-pound dead giant squid was found near the coast of Matagorda, Texas. This is only the third giant squid ever found in the Gulf of Mexico. As usual, you can...

The Concerted Effort to Remove Data Collection Restrictions
From Schneier on Security

The Concerted Effort to Remove Data Collection Restrictions

Since the beginning, data privacy regulation focused on collection, storage, and use. You can see it in the OECD Privacy Framework from 1980 (see also this proposed...

Tabnapping: A New Phishing Attack
From Schneier on Security

Tabnapping: A New Phishing Attack

Aza Raskin describes a new phishing attack: taking over a background tab on a browser to trick people into entering in their login credentials. Clever....

WikiLeaks Spy Files
From Schneier on Security

WikiLeaks Spy Files

WikiLeaks has organized the trove of documents about corporations aiding government surveillance around the world. It's worth wandering around through all this...

Safeplug Security Analysis
From Schneier on Security

Safeplug Security Analysis

Good security analysis of Safeplug, which is basically Tor in a box. Short answer: not yet....

Wi-Fi Jammer
From Schneier on Security

Wi-Fi Jammer

A device called Cyborg Unplugged can be configured to prevent any Wi-Fi connection: Oliver notes on the product's website that its so-called "All Out Mode" -- which...

iPhone Payment Security
From Schneier on Security

iPhone Payment Security

Apple is including some sort of automatic credit-card payment system with the iPhone 6. They're using some security feature of the phone and system to negotiate...

Friday Squid Blogging: Book by One Squid-Obsessed Person About Another
From Schneier on Security

Friday Squid Blogging: Book by One Squid-Obsessed Person About Another

Preparing the Ghost: An Essay Concerning the Giant Squid and Its First Photographer, by Matthew Gavin Frank. As usual, you can also use this squid post to talk...

Security of Password Managers
From Schneier on Security

Security of Password Managers

At USENIX Security this year there were two papers studying the security of password managers: David Silver, Suman Jana, and Dan Boneh, "Password Managers: Attacks...

JackPair Encrypted Phone Add-On
From Schneier on Security

JackPair Encrypted Phone Add-On

JackPair is a clever device encrypts your voice between your headset and the audio jack. The crypto looks competent, and the design looks well-thought-out. I'd...

Electromagnetic Weapons
From Schneier on Security

Electromagnetic Weapons

Long article in IEEE Spectrum....

Pencil-and-Paper Codes Used by Central American Criminal Gangs
From Schneier on Security

Pencil-and-Paper Codes Used by Central American Criminal Gangs

No mention of how good the codes are. My guess is not very....

Squid Skin Inspires Eye-Like Photodetector
From Schneier on Security

Squid Skin Inspires Eye-Like Photodetector

Squid are color-blind, but may detect color directly through their skin. A researcher is working on a system to detect colored light the way squid do....

Cell Phone Kill Switches Mandatory in California
From Schneier on Security

Cell Phone Kill Switches Mandatory in California

California passed a kill-switch law, meaning that all cell phones sold in California must have the capability to be remotely turned off. It was sold as an antitheft...

ISIS Threatens US with Terrorism
From Schneier on Security

ISIS Threatens US with Terrorism

They're openly mocking our profiling. But in several telephone conversations with a Reuters reporter over the past few months, Islamic State fighters had indicated...

Hacking Traffic Lights
From Schneier on Security

Hacking Traffic Lights

New paper: "Green Lights Forever: Analyzing the Security of Traffic Infrastructure," Branden Ghena, William Beyer, Allen Hillaker, Jonathan Pevarnek, and J. Alex...

Security Flaws in Rapiscan Full-Body Scanners
From Schneier on Security

Security Flaws in Rapiscan Full-Body Scanners

Security researchers have finally gotten their hands on a Rapiscan backscatter full-body scanner. The results aren't very good. Website with paper and images. News...

Security by Obscurity at Healthcare.gov Site
From Schneier on Security

Security by Obscurity at Healthcare.gov Site

The White House is refusing to release details about the security of healthcare.gov because it might help hackers. What this really means is that the security details...

Eavesdropping Using Smart Phone Gyroscopes
From Schneier on Security

Eavesdropping Using Smart Phone Gyroscopes

The gyroscopes are sensitive enough to pick up acoustic vibrations. It's crude, but it works. Paper. Wired article. Hacker News thread....
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account