acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorBruce Schneier
bg-corner

Friday Squid Blogging: WTF Evolution Features a Squid
From Schneier on Security

Friday Squid Blogging: WTF Evolution Features a Squid

I have always liked the "WTF, Evolution?" blog. Consistently funny, but no squid. But now they have a bit on the vampire squid. As usual, you can also use this...

More on Hacking Team's Government Spying Software
From Schneier on Security

More on Hacking Team's Government Spying Software

Hacking Team is an Italian malware company that sells exploit tools to governments. Both Kaspersky Lab and Citizen Lab have published detailed reports on its capabilities...

Pepper Spray Drones
From Schneier on Security

Pepper Spray Drones

Coming soon to a protest near you: drones that fire pepper spray bullets. Desert Wolf's website states that its Skunk octacopter drone is fitted with four high-capacity...

Risks of Not Understanding a One-Way Function
From Schneier on Security

Risks of Not Understanding a One-Way Function

New York City officials anonymized license plate data by hashing the individual plate numbers with MD5. (I know, they shouldn't have used MD5, but ignore that for...

Could Keith Alexander's Advice Possibly Be Worth $600K a Month?
From Schneier on Security

Could Keith Alexander's Advice Possibly Be Worth $600K a Month?

Ex-NSA director Keith Alexander has his own consulting company: IronNet Cybersecurity Inc. His advice does not come cheap: Alexander offered to provide advice to...

Quadrennial Homeland Security Review
From Schneier on Security

Quadrennial Homeland Security Review

The second Quadrennial Homeland Security Review has been published by the Department of Homeland Security. At 100+ pages, I'm not going to be reading it, but I...

Defending Against Algorithm Substitution Attacks
From Schneier on Security

Defending Against Algorithm Substitution Attacks

Interesting paper: M. Bellare, K. Paterson, and P. Rogaway, "Security of Symmetric Encryption against Mass Surveillance." Abstract: Motivated by revelations concerning...

Building Retro Reflectors
From Schneier on Security

Building Retro Reflectors

A group of researchers have reverse-engineered the NSA's retro reflectors, and has recreated them using software-defined radio (SDR): An SDR Ossmann designed and...

Friday Squid Blogging: Ruth Reichl Cooks Squid
From Schneier on Security

Friday Squid Blogging: Ruth Reichl Cooks Squid

Quick and easy recipe. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Co3 Systems Is Hiring
From Schneier on Security

Co3 Systems Is Hiring

At the beginning of the year, I announced that I'd joined Co3 Systems as its CTO. Co3 Systems makes coordination software -- what I hear called workflow management...

More Details on NSA Tapping the Internet Backbone
From Schneier on Security

More Details on NSA Tapping the Internet Backbone

Two new stories: one from Der Spiegel in Germany (also reported in the Intercept) and the other from Dagbladet in Denmark (again, also reported in the Intercept)...

Paying People to Infect their Computers
From Schneier on Security

Paying People to Infect their Computers

Research paper: "It’s All About The Benjamins: An empirical study on incentivizing users to ignore security advice, by Nicolas Christin, Serge Egelman, Timothy...

The Democratization of Surveillance
From Schneier on Security

The Democratization of Surveillance

MarketWatch has a list of five apps for spying on your spouse....

Story of a $10 Million Remote Scam
From Schneier on Security

Story of a $10 Million Remote Scam

This is a bizarre story of an almost-happened $10 million scam. It reads like an obviously phony Nigerian 419 scam, but it actually fooled what seem to be smart...

Use of Social Media by ISIS
From Schneier on Security

Use of Social Media by ISIS

Here are two articles about how effectively the Islamic State of Iraq and Syria (ISIS) -- the militant group that has just taken over half of Iraq -- is using social...

The State of Cyberinsurance
From Schneier on Security

The State of Cyberinsurance

Good essay on the current state of cyberinsurance. So where does that leave the growing cyber insurance industry as it tries to figure out what losses it should...

Falsifying Evidence on a Smart Phone
From Schneier on Security

Falsifying Evidence on a Smart Phone

Here's a way to plant false evidence -- call records, locations, etc -- on your smart phone. I have no idea how good this will be. Presumably it will be an arms...

Friday Squid Blogging: Antibiotic-Resistant Bacteria Found in Canadian Squid
From Schneier on Security

Friday Squid Blogging: Antibiotic-Resistant Bacteria Found in Canadian Squid

This is not good news. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

"Erotica Written By Someone With An Appropriate Sense of Privacy"
From Schneier on Security

"Erotica Written By Someone With An Appropriate Sense of Privacy"

Funny....

Seventh Movie-Plot Threat Contest Winner
From Schneier on Security

Seventh Movie-Plot Threat Contest Winner

On April 1, I announced the Seventh Mostly Annual Movie-Plot Threat Contest: The NSA has won, but how did it do it? How did it use its ability to conduct ubiquitous...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account