acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorBruce Schneier
bg-corner

Companies that Scrape Your Email
From Schneier on Security

Companies that Scrape Your Email

Motherboard has a long article on apps -- Edison, Slice, and Cleanfox -- that spy on your email by scraping your screen, and then sell that information to others...

Crypto AG Was Owned by the CIA
From Schneier on Security

Crypto AG Was Owned by the CIA

The Swiss cryptography firm Crypto AG sold equipment to governments and militaries around the world for decades after World War II. They were owned by the CIA:...

Apple's Tracking-Prevention Feature in Safari has a Privacy Bug
From Schneier on Security

Apple's Tracking-Prevention Feature in Safari has a Privacy Bug

Last month, engineers at Google published a very curious privacy bug in Apple's Safari web browser. Apple's Intelligent Tracking Prevention, a feature designed...

Friday Squid Blogging: An MRI Scan of a Squid's Brain
From Schneier on Security

Friday Squid Blogging: An MRI Scan of a Squid's Brain

This paper is filled with brain science that I do not understand (news article), but fails to answer what I consider to be the important question: how do you keep...

Security in 2020: Revisited
From Schneier on Security

Security in 2020: Revisited

Ten years ago, I wrote an essay: "Security in 2020." Well, it's finally 2020. I think I did pretty well. Here's what I said back then: There's really no such thing...

New Ransomware Targets Industrial Control Systems
From Schneier on Security

New Ransomware Targets Industrial Control Systems

EKANS is a new ransomware that targets industrial control systems: But EKANS also uses another trick to ratchet up the pain: It's designed to terminate 64 different...

A New Clue for the Kryptos Sculpture
From Schneier on Security

A New Clue for the Kryptos Sculpture

Jim Sanborn, who designed the Kryptos sculpture in a CIA courtyard, has released another clue to the still-unsolved part 4. I think he's getting tired of waiting...

Tree Code
From Schneier on Security

Tree Code

Artist Katie Holten has developed a tree code (basically, a font in trees), and New York City is using it to plant secret messages in parks....

New Research on the Adtech Industry
From Schneier on Security

New Research on the Adtech Industry

The Norwegian Consumer Council has published an extensive report about how the adtech industry violates consumer privacy. At the same time, it is filing three legal...

Attacking Driverless Cars with Projected Images
From Schneier on Security

Attacking Driverless Cars with Projected Images

Interesting research -- "Phantom Attacks Against Advanced Driving Assistance Systems": Abstract: The absence of deployed vehicular communication systems, which...

Friday Squid Blogging: The Pterosaur Ate Squid
From Schneier on Security

Friday Squid Blogging: The Pterosaur Ate Squid

New research: "Pterosaurs ate soft-bodied cephalopods (Coleiodea)." News article. As usual, you can also use this squid post to talk about the security stories...

NSA Security Awareness Posters
From Schneier on Security

NSA Security Awareness Posters

From a FOIA request, over a hundred old NSA security awareness posters. Here are the BBC's favorites. Here are Motherboard's favorites. I have a related personal...

U.S. Department of Interior Grounding All Drones
From Schneier on Security

U.S. Department of Interior Grounding All Drones

The Department of Interior is grounding all non-emergency drones due to security concerns: The order comes amid a spate of warnings and bans at multiple government...

Collating Hacked Data Sets
From Schneier on Security

Collating Hacked Data Sets

Two Harvard undergraduates completed a project where they went out on the Dark Web and found a bunch of stolen datasets. Then they correlated all the information...

Customer Tracking at Ralphs Grocery Store
From Schneier on Security

Customer Tracking at Ralphs Grocery Store

To comply with California's new data privacy law, companies that collect information on consumers and users are forced to be more transparent about it. Sometimes...

Google Receives Geofence Warrants
From Schneier on Security

Google Receives Geofence Warrants

Sometimes it's hard to tell the corporate surveillance operations from the government ones: Google reportedly has a database called Sensorvault in which it stores...

Modern Mass Surveillance: Identify, Correlate, Discriminate
From Schneier on Security

Modern Mass Surveillance: Identify, Correlate, Discriminate

Communities across the United States are starting to ban facial recognition technologies. In May of last year, San Francisco banned facial recognition; the neighboring...

Smartphone Election in Washington State
From Schneier on Security

Smartphone Election in Washington State

This year: King County voters will be able to use their name and birthdate to log in to a Web portal through the Internet browser on their phones, says Bryan Finney...

Friday Squid Blogging: More on the Giant Squid's DNA
From Schneier on Security

Friday Squid Blogging: More on the Giant Squid's DNA

Following on from last week's post, here's more information on sequencing the DNA of the giant squid. As usual, you can also use this squid post to talk about the...

Technical Report of the Bezos Phone Hack
From Schneier on Security

Technical Report of the Bezos Phone Hack

Motherboard obtained and published the technical report on the hack of Jeff Bezos's phone, which is being attributed to Saudi Arabia, specifically to Crown Prince...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account