acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorBruce Schneier
bg-corner

Cracking the Passwords of Early Internet Pioneers
From Schneier on Security

Cracking the Passwords of Early Internet Pioneers

Lots of them weren't very good: BSD co-inventor Dennis Ritchie, for instance, used "dmac" (his middle name was MacAlistair); Stephen R. Bourne, creator of the Bourne...

Factoring 2048-bit Numbers Using 20 Million Qubits
From Schneier on Security

Factoring 2048-bit Numbers Using 20 Million Qubits

This theoretical paper shows how to factor 2048-bit RSA moduli with a 20-million qubit quantum computer in eight hours. It's interesting work, but I don't want...

Friday Squid Blogging: Apple Fixes Squid Emoji
From Schneier on Security

Friday Squid Blogging: Apple Fixes Squid Emoji

Apple fixed the squid emoji in iOS 13.1: A squid's siphon helps it move, breathe, and discharge waste, so having the siphon in back makes more sense than having...

I Have a New Book: We Have Root
From Schneier on Security

I Have a New Book: We Have Root

I just published my third collection of essays: We Have Root. This book covers essays from 2013 to 2017. (The first two are Schneier on Security and Carry On.)...

Details on Uzbekistan Government Malware: SandCat
From Schneier on Security

Details on Uzbekistan Government Malware: SandCat

Kaspersky has uncovered an Uzbeki hacking operation, mostly due to incompetence on the part of the government hackers. The group's lax operational security includes...

New Reductor Nation-State Malware Compromises TLS
From Schneier on Security

New Reductor Nation-State Malware Compromises TLS

Kaspersky has a detailed blog post about a new piece of sophisticated malware that it's calling Reductor. The malware is able to compromise TLS traffic by infecting...

Wi-Fi Hotspot Tracking
From Schneier on Security

Wi-Fi Hotspot Tracking

Free Wi-Fi hotspots can track your location, even if you don't connect to them. This is because your phone or computer broadcasts a unique MAC address. What distinguishes...

Cheating at Professional Poker
From Schneier on Security

Cheating at Professional Poker

Interesting story about someone who is almost certainly cheating at professional poker. But then I start to see things that seem so obvious, but I wonder whether...

Illegal Data Center Hidden in Former NATO Bunker
From Schneier on Security

Illegal Data Center Hidden in Former NATO Bunker

Interesting: German investigators said Friday they have shut down a data processing center installed in a former NATO bunker that hosted sites dealing in drugs...

Speakers Censored at AISA Conference in Melbourne
From Schneier on Security

Speakers Censored at AISA Conference in Melbourne

Two speakers were censored at the Australian Information Security Association's annual conference this week in Melbourne. Thomas Drake, former NSA employee and...

New Unpatchable iPhone Exploit Allows Jailbreaking
From Schneier on Security

New Unpatchable iPhone Exploit Allows Jailbreaking

A new iOS exploit allows jailbreaking of pretty much all version of the iPhone. This is a huge deal for Apple, but at least it doesn't allow someone to remotely...

Edward Snowden's Memoirs
From Schneier on Security

Edward Snowden's Memoirs

Ed Snowden has published a book of his memoirs: Permanent Record. I have not read it yet, but I want to point you all towards two pieces of writing about the book...

Friday Squid Blogging: Hawaiian Bobtail Squid Squirts Researcher
From Schneier on Security

Friday Squid Blogging: Hawaiian Bobtail Squid Squirts Researcher

Cute video. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here...

More Cryptanalysis of Solitaire
From Schneier on Security

More Cryptanalysis of Solitaire

In 1999, I invented the Solitaire encryption algorithm, designed to manually encrypt data using a deck of cards. It was written into the plot of Neal Stephenson's...

Tracking by Smart TVs
From Schneier on Security

Tracking by Smart TVs

Long Twitter thread about the tracking embedded in modern digital televisions. The thread references three academic papers....

Measuring the Security of IoT Devices
From Schneier on Security

Measuring the Security of IoT Devices

In August, CyberITL completed a large-scale survey of software security practices in the IoT environment, by looking at the compiled software. Data Collected: 22...

New Research into Russian Malware
From Schneier on Security

New Research into Russian Malware

There's some interesting new research about Russian APT malware: The Russian government has fostered competition among the three agencies, which operate independently...

NSA on the Future of National Cybersecurity
From Schneier on Security

NSA on the Future of National Cybersecurity

Glenn Gerstell, the General Counsel of the NSA, wrote a long and interesting op-ed for the New York Times where he outlined a long list of cyber risks facing the...

Supply-Chain Security and Trust
From Schneier on Security

Supply-Chain Security and Trust

The United States government's continuing disagreement with the Chinese company Huawei underscores a much larger problem with computer technologies in general:...

Friday Squid Blogging: Did Super-Intelligent Giant Squid Steal an Underwater Research Station?
From Schneier on Security

Friday Squid Blogging: Did Super-Intelligent Giant Squid Steal an Underwater Research Station?

There's no proof they did, but there's no proof they didn't. As usual, you can also use this squid post to talk about the security stories in the news that I haven't...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account