acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorBruce Schneier
bg-corner

Fooling Automated Surveillance Cameras with Patchwork Color Printout
From Schneier on Security

Fooling Automated Surveillance Cameras with Patchwork Color Printout

Nice bit of adversarial machine learning. The image from this news article is most of what you need to know, but here's the research paper....

Vulnerability in French Government Tchap Chat App
From Schneier on Security

Vulnerability in French Government Tchap Chat App

A researcher found a vulnerability in the French government WhatsApp replacement app: Tchap. The vulnerability allows anyone to surreptitiously join any conversation...

G7 Comes Out in Favor of Encryption Backdoors
From Schneier on Security

G7 Comes Out in Favor of Encryption Backdoors

From a G7 meeting of interior ministers in Paris this month, an "outcome document": Encourage Internet companies to establish lawful access solutions for their...

Excellent Analysis of the Boeing 737 MAX Software Problems
From Schneier on Security

Excellent Analysis of the Boeing 737 MAX Software Problems

This is the best analysis of the software causes of the Boeing 737 MAX disasters that I have read. Technically this is safety and not security; there was no attacker...

Friday Squid Blogging: New Squid Species off the New Zealand Coast
From Schneier on Security

Friday Squid Blogging: New Squid Species off the New Zealand Coast

There's a new diversity of species. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog...

Iranian Cyber-Espionage Tools Leaked Online
From Schneier on Security

Iranian Cyber-Espionage Tools Leaked Online

The source code of a set of Iranian cyber-espoinage tools was leaked online....

New DNS Hijacking Attacks
From Schneier on Security

New DNS Hijacking Attacks

DNS hijacking isn't new, but this seems to be an attack of uprecidented scale: Researchers at Cisco's Talos security division on Wednesday revealed that a hacker...

A "Department of Cybersecurity"
From Schneier on Security

A "Department of Cybersecurity"

Presidential candidate John Delaney has announced a plan to create a Department of Cybersecurity. I have long been in favor of a new federal agency to deal with...

More on the Triton Malware
From Schneier on Security

More on the Triton Malware

FireEye is releasing much more information about the Triton malware that attacks critical infrastructure. It has been discovered in more places. This is also a...

Vulnerabilities in the WPA3 Wi-Fi Security Protocol
From Schneier on Security

Vulnerabilities in the WPA3 Wi-Fi Security Protocol

Researchers have found several vulnerabilities in the WPA3 Wi-Fi security protocol: The design flaws we discovered can be divided in two categories. The first category...

China Spying on Undersea Internet Cables
From Schneier on Security

China Spying on Undersea Internet Cables

Supply chain security is an insurmountably hard problem. The recent focus is on Chinese 5G equipment, but the problem is much broader. This opinion piece looks...

Friday Squid Blogging: Detecting Illegal Squid Fishing with Satellite Imagery
From Schneier on Security

Friday Squid Blogging: Detecting Illegal Squid Fishing with Satellite Imagery

Interesting. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here...

Maliciously Tampering with Medical Imagery
From Schneier on Security

Maliciously Tampering with Medical Imagery

In what I am sure is only a first in many similar demonstrations, researchers are able to add or remove cancer signs from CT scans. The results easily fool radiologists...

New Version of Flame Malware Discovered
From Schneier on Security

New Version of Flame Malware Discovered

Flame was discovered in 2012, linked to Stuxnet, and believed to be American in origin. It has recently been linked to more modern malware through new analysis...

TajMahal Spyware
From Schneier on Security

TajMahal Spyware

Kaspersky has released details about a sophisticated nation-state spyware it calls TajMahal: The TajMahal framework's 80 modules, Shulmin says, comprise not only...

How the Anonymous Artist Bansky Authenticates His or Her Work
From Schneier on Security

How the Anonymous Artist Bansky Authenticates His or Her Work

Interesting scheme: It all starts off with a fairly bog standard gallery style certificate. Details of the work, the authenticating agency, a bit of embossing and...

Hey Secret Service: Don't Plug Suspect USB Sticks into Random Computers
From Schneier on Security

Hey Secret Service: Don't Plug Suspect USB Sticks into Random Computers

I just noticed this bit from the incredibly weird story of the Chinese woman arrested at Mar-a-Lago: Secret Service agent Samuel Ivanovich, who interviewed Zhang...

Ghidra: NSA's Reverse-Engineering Tool
From Schneier on Security

Ghidra: NSA's Reverse-Engineering Tool

Last month, the NSA released Ghidra, a software reverse-engineering tool. Early reactions are uniformly positive. Three news articles....

Friday Squid Blogging: Fried Squid Recipe
From Schneier on Security

Friday Squid Blogging: Fried Squid Recipe

This is an easy fried squid recipe with saffron and agrodolce. As usual, you can also use this squid post to talk about the security stories in the news that I...

Unhackable Cryptography?
From Schneier on Security

Unhackable Cryptography?

A recent article overhyped the release of EverCrypt, a cryptography library created using formal methods to prove security against specific attacks. The Quantum...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account