acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorBruce Schneier
bg-corner

Former Mozilla CTO Harassed at the US Border
From Schneier on Security

Former Mozilla CTO Harassed at the US Border

This is a pretty awful story of how Andreas Gal, former Mozilla CTO and US citizen, was detained and threatened at the US border. CBP agents demanded that he unlock...

Adversarial Machine Learning against Tesla's Autopilot
From Schneier on Security

Adversarial Machine Learning against Tesla's Autopilot

Researchers have been able to fool Tesla's autopilot in a variety of ways, including convincing it to drive into oncoming traffic. It requires the placement of...

How Political Campaigns Use Personal Data
From Schneier on Security

How Political Campaigns Use Personal Data

Really interesting report from Tactical Tech. Data-driven technologies are an inevitable feature of modern political campaigning. Some argue that they are a welcome...

Hacking Instagram to Get Free Meals in Exchange for Positive Reviews
From Schneier on Security

Hacking Instagram to Get Free Meals in Exchange for Positive Reviews

This is a fascinating hack: In today's digital age, a large Instagram audience is considered a valuable currency. I had also heard through the grapevine that I...

Recovering Smartphone Typing from Microphone Sounds
From Schneier on Security

Recovering Smartphone Typing from Microphone Sounds

Yet another side-channel attack on smartphones: "Hearing your touch: A new acoustic side channel on smartphones," by Ilia Shumailov, Laurent Simon, Jeff Yan, and...

Friday Squid Blogging: Restoring the Giant Squid at the Museum of Natural History
From Schneier on Security

Friday Squid Blogging: Restoring the Giant Squid at the Museum of Natural History

It is traveling to Paris. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting...

NSA-Inspired Vulnerability Found in Huawei Laptops
From Schneier on Security

NSA-Inspired Vulnerability Found in Huawei Laptops

This is an interesting story of a serious vulnerability in a Huawei driver that Microsoft found. The vulnerability is similar in style to the NSA's DOUBLEPULSAR...

Malware Installed in Asus Computers Through Hacked Update Process
From Schneier on Security

Malware Installed in Asus Computers Through Hacked Update Process

Kaspersky Labs is reporting on a new supply chain attack they call "Shadowhammer." In January 2019, we discovered a sophisticated supply chain attack involving...

Programmers Who Don't Understand Security Are Poor at Security
From Schneier on Security

Programmers Who Don't Understand Security Are Poor at Security

A university study confirmed the obvious: if you pay a random bunch of freelance programmers a small amount of money to write security software, they're not going...

Personal Data Left on Used Laptops
From Schneier on Security

Personal Data Left on Used Laptops

A recent experiment found all sorts of personal data left on used laptops and smartphones. This should come as no surprise. Simson Garfinkel performed the same...

Mail Fishing
From Schneier on Security

Mail Fishing

Not email, paper mail: Thieves, often at night, use string to lower glue-covered rodent traps or bottles coated with an adhesive down the chute of a sidewalk mailbox...

Friday Squid Blogging: New Research on Squid Camouflage
From Schneier on Security

Friday Squid Blogging: New Research on Squid Camouflage

From the New York Times: Now, a paper published last week in Nature Communications suggests that their chromatophores, previously thought to be mainly pockets of...

Enigma, Typex, and Bombe Simulators
From Schneier on Security

Enigma, Typex, and Bombe Simulators

GCHQ has put simulators for the Enigma, Typex, and Bombe on the Internet. News article....

First Look Media Shutting Down Access to Snowden NSA Archives
From Schneier on Security

First Look Media Shutting Down Access to Snowden NSA Archives

The Daily Beast is reporting that First Look Media -- home of The Intercept and Glenn Greenwald -- is shutting down access to the Snowden archives. The Intercept...

Zipcar Disruption
From Schneier on Security

Zipcar Disruption

This isn't a security story, but it easily could have been. Last Saturday, Zipcar had a system outage: "an outage experienced by a third party telecommunications...

An Argument that Cybersecurity Is Basically Okay
From Schneier on Security

An Argument that Cybersecurity Is Basically Okay

Andrew Odlyzko's new essay is worth reading -- "Cybersecurity is not very important": Abstract: There is a rising tide of security breaches. There is an even faster...

Triton
From Schneier on Security

Triton

Good article on the Triton malware which targets industrial control systems....

CAs Reissue Over One Million Weak Certificates
From Schneier on Security

CAs Reissue Over One Million Weak Certificates

Turns out that the software a bunch of CAs used to generate public-key certificates was flawed: they created random serial numbers with only 63 bits instead of...

Friday Squid Blogging: A Squid-Related Vacation Tour in Hawaii
From Schneier on Security

Friday Squid Blogging: A Squid-Related Vacation Tour in Hawaii

You can hunt for the Hawaiian bobtail squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read...

I Was Cited in a Court Decision
From Schneier on Security

I Was Cited in a Court Decision

An article I co-wrote -- my first law journal article -- was cited by the Massachusetts Supreme Judicial Court -- the state supreme court -- in a case on compelled...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account