acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorBruce Schneier
bg-corner

Friday Squid Blogging: Linguine allo Scoglio Recipe
From Schneier on Security

Friday Squid Blogging: Linguine allo Scoglio Recipe

Delicious seafood pasta dish — includes squid — from America’s Test Kitchen. As usual, you can also use this squid post to talk about the security stories in the...

Friday Squid Blogging: Small Giant Squid Washes Ashore in Japan
From Schneier on Security

Friday Squid Blogging: Small Giant Squid Washes Ashore in Japan

A ten-foot giant squid has washed ashore on the Western coast of Japan. As usual, you can also use this squid post to talk about the security stories in the news...

Investigating the Navalny Poisoning
From Schneier on Security

Investigating the Navalny Poisoning

Bellingcat has investigated the near-fatal poisoning of Alexey Navalny by the Russian GRU back in August. The details display some impressive traffic analysis.confession...

Eavesdropping on Phone Taps from Voice Assistants
From Schneier on Security

Eavesdropping on Phone Taps from Voice Assistants

The microphones on voice assistants are very sensitive, and can snoop on all sorts of data: In Hey Alexa what did I just type? we show that when sitting up to half...

Friday Squid Blogging: Christmas Squid Memories
From Schneier on Security

Friday Squid Blogging: Christmas Squid Memories

Stuffed squid for Christmas Eve. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my bloghere...

NSA on Authentication Hacks (Related to SolarWinds Breach)
From Schneier on Security

NSA on Authentication Hacks (Related to SolarWinds Breach)

The NSA has published an advisory outlining how “malicious cyber actors” are “are manipulating trust in federated authentication environments to access protected...

More on the SolarWinds Breach
From Schneier on Security

More on the SolarWinds Breach

The New York Times has more details. About 18,000 private and government users downloaded a Russian tainted software update –­ a Trojan horse of sorts ­– that...

Cellebrite Can Break Signal
From Schneier on Security

Cellebrite Can Break Signal

Cellebrite announced that it can break Signal. (Note that the company has heavily edited its blog post, but the original — with lots of technical details — wasarticle...

How the SolarWinds Hackers Bypassed Duo’s Multi-Factor Authentication
From Schneier on Security

How the SolarWinds Hackers Bypassed Duo’s Multi-Factor Authentication

This is interesting: Toward the end of the second incident that Volexity worked involving Dark Halo, the actor was observed accessing the e-mail account of a user...

US Schools Are Buying Cell Phone Unlocking Systems
From Schneier on Security

US Schools Are Buying Cell Phone Unlocking Systems

Gizmodo is reporting that schools in the US are buying equipment to unlock cell phones from companies like Cellebrite: Gizmodo has reviewed similar accounting documents...

Mexican Drug Cartels with High-Tech Spyware
From Schneier on Security

Mexican Drug Cartels with High-Tech Spyware

Sophisticated spyware, sold by surveillance tech companies to Mexican government agencies, are ending up in the hands of drug cartels: As many as 25 private companies...

Zodiac Killer Cipher Solved
From Schneier on Security

Zodiac Killer Cipher Solved

The SF Chronicle is reporting (more details here), and the FBI is confirming, that a Melbourne mathematician and team has decrypted the 1969 message sent by the...

Another Massive Russian Hack of US Government Networks
From Schneier on Security

Another Massive Russian Hack of US Government Networks

The press is reporting a massive hack of US government networks by sophisticated Russian hackers. Officials said a hunt was on to determine if other parts of the...

Should There Be Limits on Persuasive Technologies?
From Schneier on Security

Should There Be Limits on Persuasive Technologies?

Persuasion is as old as our species. Both democracy and the market economy depend on it. Politicians persuade citizens to vote for them, or to support different...

Authentication Failure
From Schneier on Security

Authentication Failure

This is a weird story of a building owner commissioning an artist to paint a mural on the side of his building — except that he wasn’t actually the building’s owner...

Friday Squid Blogging: Newly Identified Ichthyosaur Species Probably Ate Squid
From Schneier on Security

Friday Squid Blogging: Newly Identified Ichthyosaur Species Probably Ate Squid

This is a deep-diving species that “fed on small prey items such as squid.” Academic paper. As usual, you can also use this squid post to talk about the security...

A Cybersecurity Policy Agenda
From Schneier on Security

A Cybersecurity Policy Agenda

The Aspen Institute’s Aspen Cybersecurity Group — I’m a member — has released its cybersecurity policy agenda for the next four years. The next administration and...

Finnish Data Theft and Extortion
From Schneier on Security

Finnish Data Theft and Extortion

The Finnish psychotherapy clinic Vastaamo was the victim of a data breach and theft. The criminals tried extorting money from the clinic. When that failed, they...

FireEye Hacked
From Schneier on Security

FireEye Hacked

FireEye was hacked by — they believe — “a nation with top-tier offensive capabilities”: During our investigation to date, we have found that the attacker targeted...

Oblivious DNS-over-HTTPS
From Schneier on Security

Oblivious DNS-over-HTTPS

This new protocol, called Oblivious DNS-over-HTTPS (ODoH), hides the websites you visit from your ISP. Here’s how it works: ODoH wraps a layer of encryption around...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account