acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorBruce Schneier
bg-corner

Details of an Airbnb Fraud
From Schneier on Security

Details of an Airbnb Fraud

This is a fascinating article about a bait-and-switch Airbnb fraud. The article focuses on one particular group of scammers and how they operate, using the fact...

Obfuscation as a Privacy Tool
From Schneier on Security

Obfuscation as a Privacy Tool

This essay discusses the futility of opting out of surveillance, and suggests data obfuscation as an alternative. We can apply obfuscation in our own lives by using...

Homemade TEMPEST Receiver
From Schneier on Security

Homemade TEMPEST Receiver

Tom's Guide writes about home brew TEMPEST receivers: Today, dirt-cheap technology and free software make it possible for ordinary citizens to run their own Tempest...

Friday Squid Blogging: Triassic Kraken
From Schneier on Security

Friday Squid Blogging: Triassic Kraken

Research paper: "Triassic Kraken: The Berlin Ichthyosaur Death Assemblage Interpreted as a Giant Cephalopod Midden": Abstract: The Luning Formation at Berlin Ichthyosaur...

Resources for Measuring Cybersecurity
From Schneier on Security

Resources for Measuring Cybersecurity

Kathryn Waldron at R Street has collected all of the different resources and methodologies for measuring cybersecurity....

A Broken Random Number Generator in AMD Microcode
From Schneier on Security

A Broken Random Number Generator in AMD Microcode

Interesting story. I always recommend using a random number generator like Fortuna, even if you're using a hardware random source. It's just safer....

WhatsApp Sues NSO Group
From Schneier on Security

WhatsApp Sues NSO Group

WhatsApp is suing the Israeli cyberweapons arms manufacturer NSO Group in California court: WhatsApp's lawsuit, filed in a California court on Tuesday, has demanded...

ICT Supply-Chain Security
From Schneier on Security

ICT Supply-Chain Security

The Carnegie Endowment for Peace published a comprehensive report on ICT (information and communication technologies) supply-chain security and integrity. It's...

Former FBI General Counsel Jim Baker Chooses Encryption Over Backdoors
From Schneier on Security

Former FBI General Counsel Jim Baker Chooses Encryption Over Backdoors

In an extraordinary essay, the former FBI general counsel Jim Baker makes the case for strong encryption over government-mandated backdoors: In the face of congressional...

Friday Squid Blogging: Researchers Investigating Using Squid Propulsion for Underwater Robots
From Schneier on Security

Friday Squid Blogging: Researchers Investigating Using Squid Propulsion for Underwater Robots

Interesting article and paper. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting...

Dark Web Site Taken Down without Breaking Encryption
From Schneier on Security

Dark Web Site Taken Down without Breaking Encryption

The US Department of Justice unraveled a dark web child-porn website, leading to the arrest of 337 people in at least 18 countries. This was all accomplished not...

Mapping Security and Privacy Research across the Decades
From Schneier on Security

Mapping Security and Privacy Research across the Decades

This is really interesting: "A Data-Driven Reflection on 36 Years of Security and Privacy Research," by Aniqua Baset and Tamara Denning: Abstract: Meta-research...

NordVPN Breached
From Schneier on Security

NordVPN Breached

There was a successful attack against NordVPN: Based on the command log, another of the leaked secret keys appeared to secure a private certificate authority that...

Public Voice Launches Petition for an International Moratorium on Using Facial Recognition for Mass Surveillance
From Schneier on Security

Public Voice Launches Petition for an International Moratorium on Using Facial Recognition for Mass Surveillance

Coming out of the Privacy Commissioners' Conference in Albania, Public Voice is launching a petition for an international moratorium on using facial recognition...

Calculating the Benefits of the Advanced Encryption Standard
From Schneier on Security

Calculating the Benefits of the Advanced Encryption Standard

NIST has completed a study -- it was published last year, but I just saw it recently -- calculating the costs and benefits of the Advanced Encryption Standard....

Details of the Olympic Destroyer APT
From Schneier on Security

Details of the Olympic Destroyer APT

Interesting details on Olympic Destroyer, the nation-state cyberattack against the 2018 Winter Olympic Games in South Korea. Wired's Andy Greenberg presents evidence...

Friday Squid Blogging: Six-Foot-Long Mass of Squid Eggs Found on Great Barrier Reef
From Schneier on Security

Friday Squid Blogging: Six-Foot-Long Mass of Squid Eggs Found on Great Barrier Reef

It's likely the diamondback squid. There's a video. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered...

Why Technologists Need to Get Involved in Public Policy
From Schneier on Security

Why Technologists Need to Get Involved in Public Policy

Last month, I gave a 15-minute talk in London titled: "Why technologists need to get involved in public policy." In it, I try to make the case for public-interest...

Adding a Hardware Backdoor to a Networked Computer
From Schneier on Security

Adding a Hardware Backdoor to a Networked Computer

Interesting proof of concept: At the CS3sthlm security conference later this month, security researcher Monta Elkins will show how he created a proof-of-concept...

Using Machine Learning to Detect IP Hijacking
From Schneier on Security

Using Machine Learning to Detect IP Hijacking

This is interesting research: In a BGP hijack, a malicious actor convinces nearby networks that the best path to reach a specific IP address is through their network...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account