acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorBruce Schneier
bg-corner

Alaska’s Department of Health and Social Services Hack
From Schneier on Security

Alaska’s Department of Health and Social Services Hack

Apparently, a nation-state hacked Alaska’s Department of Health and Social Services. Not sure why Alaska’s Department of Health and Social Services is of any interest...

Friday Squid Blogging: Ram’s Horn Squid Shells
From Schneier on Security

Friday Squid Blogging: Ram’s Horn Squid Shells

You can find ram’s horn squid shells on beaches in Texas (and presumably elsewhere). As usual, you can also use this squid post to talk about the security stories...

Zero-Click iMessage Exploit
From Schneier on Security

Zero-Click iMessage Exploit

Citizen Lab released a report on a zero-click iMessage exploit that is used in NSO Group’s Pegasus spyware. Apple patched the vulnerability; everyone needs to update...

Identifying Computer-Generated Faces
From Schneier on Security

Identifying Computer-Generated Faces

It’s the eyes: The researchers note that in many cases, users can simply zoom in on the eyes of a person they suspect may not be real to spot the pupil irregularities...

Designing Contact-Tracing Apps
From Schneier on Security

Designing Contact-Tracing Apps

Susan Landau wrote an essay on the privacy, efficacy, and equity of contract-tracing smartphone apps. Also see her excellent book on the topic.

Friday Squid Blogging: Possible Evidence of Squid Paternal Care
From Schneier on Security

Friday Squid Blogging: Possible Evidence of Squid Paternal Care

Researchers have found possible evidence of paternal care among bigfin reef squid. As usual, you can also use this squid post to talk about the security stories...

ProtonMail Now Keeps IP Logs
From Schneier on Security

ProtonMail Now Keeps IP Logs

After being compelled by a Swiss court to monitor IP logs for a particular user, ProtonMail no longer claims that “we do not keep any IP logs.”

More Detail on the Juniper Hack and the NSA PRNG Backdoor
From Schneier on Security

More Detail on the Juniper Hack and the NSA PRNG Backdoor

We knew the basics of this story, but it’s good to have more detail. Here’s me in 2015 about this Juniper hack. Here’s me in 2007 on the NSA backdoor.

Security Risks of Relying on a Single Smartphone
From Schneier on Security

Security Risks of Relying on a Single Smartphone

Isracard used a single cell phone to communicate with credit card clients, and receive documents via WhatsApp. An employee stole the phone. He reformatted the SIM...

Lightning Cable with Embedded Eavesdropping
From Schneier on Security

Lightning Cable with Embedded Eavesdropping

Normal-looking cables (USB-C, Lightning, and so on) that exfiltrate data over a wireless network. I blogged about a previous prototype here

Tracking People by their MAC Addresses
From Schneier on Security

Tracking People by their MAC Addresses

Yet another article on the privacy risks of static MAC addresses and always-on Bluetooth connections. This one is about wireless headphones. The good news is that...

History of the HX-63 Rotor Machine
From Schneier on Security

History of the HX-63 Rotor Machine

Jon D. Paul has written the fascinating story of the HX-63, a super-complicated electromechanical rotor cipher machine made by Crypto AG.

Zero-Click iPhone Exploits
From Schneier on Security

Zero-Click iPhone Exploits

Citizen Lab is reporting on two zero-click iMessage exploits, in spyware sold by the cyberweapons arms manufacturer NSO Group to the Bahraini government. Thesehere...

Hacker-Themed Board Game
From Schneier on Security

Hacker-Themed Board Game

Black Hat is a hacker-themed board game.

More Military Cryptanalytics, Part III
From Schneier on Security

More Military Cryptanalytics, Part III

Late last year, the NSA declassified and released a redacted version of Lambros D. Callimahos’s Military Cryptanalytics, Part III. We just got most of the index...

Excellent Write-up of the SolarWinds Security Breach
From Schneier on Security

Excellent Write-up of the SolarWinds Security Breach

Robert Chesney wrote up the Solar Winds story as a case study, and it’s a really good summary.

Details of the Recent T-Mobile Breach
From Schneier on Security

Details of the Recent T-Mobile Breach

Seems that 47 million customers were affected. Surprising no one, T-Mobile had awful security. I’ve lost count of how many times T-Mobile has been hacked.

Friday Squid Blogging: Squid Communication
From Schneier on Security

Friday Squid Blogging: Squid Communication

Interesting article on squid communication. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read...

Friday Squid Blogging: Tentacle Doorknob
From Schneier on Security

Friday Squid Blogging: Tentacle Doorknob

It’s pretty. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here...

Interesting Privilege Escalation Vulnerability
From Schneier on Security

Interesting Privilege Escalation Vulnerability

If you plug a Razer peripheral (mouse or keyboard, I think) into a Windows 10 or 11 machine, you can use a vulnerability in the Razer Synapse software — which automatically...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account