acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorBruce Schneier
bg-corner

Machine Learning to Detect Software Vulnerabilities
From Schneier on Security

Machine Learning to Detect Software Vulnerabilities

No one doubts that artificial intelligence (AI) and machine learning (ML) will transform cybersecurity. We just don't know how, or when. While the literature generally...

New Attack Against Electrum Bitcoin Wallets
From Schneier on Security

New Attack Against Electrum Bitcoin Wallets

This is clever: How the attack works: Attacker added tens of malicious servers to the Electrum wallet network. Users of legitimate Electrum wallets initiate a Bitcoin...

Friday Squid Blogging: The Future of the Squid Market
From Schneier on Security

Friday Squid Blogging: The Future of the Squid Market

It's growing. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines...

Podcast Interview with Eva Gaperon
From Schneier on Security

Podcast Interview with Eva Gaperon

Nice interview with the EFF's director of cybersecurity, Eva Gaperon....

Long-Range Familial Searching Forensics
From Schneier on Security

Long-Range Familial Searching Forensics

Good article on using long-range familial searching -- basically, DNA matching of distant relatives -- as a police forensics tool....

China's APT10
From Schneier on Security

China's APT10

Wired has an excellent article on China's APT10 hacking group. Specifically, on how they hacked managed service providers in order to get to their customers' networks...

Friday Squid Blogging: Squid-Focused Menus in Croatia
From Schneier on Security

Friday Squid Blogging: Squid-Focused Menus in Croatia

This is almost over: From 1 December 2018 -- 6 January 2019, Days of Adriatic squid will take place at restaurants all over north-west Istria. Restaurants will...

Click Here to Kill Everybody Available as an Audiobook
From Schneier on Security

Click Here to Kill Everybody Available as an Audiobook

Click Here to Kill Everybody is finally available on Audible.com. I have ten download codes. Not having anything better to do with them, here they are: HADQSSFC98WCQ...

Massive Ad Fraud Scheme Relied on BGP Hijacking
From Schneier on Security

Massive Ad Fraud Scheme Relied on BGP Hijacking

This is a really interesting story of an ad fraud scheme that relied on hijacking the Border Gateway Protocol: Members of 3ve (pronounced "eve") used their large...

Stealing Nativity Displays
From Schneier on Security

Stealing Nativity Displays

The New York Times is reporting on the security measures people are using to protect nativity displays....

Human Rights by Design
From Schneier on Security

Human Rights by Design

Good essay: "Advancing Human-Rights-By-Design In The Dual-Use Technology Industry," by Jonathon Penney, Sarah McKune, Lex Gill, and Ronald J. Deibert: But businesses...

Glitter Bomb against Package Thieves
From Schneier on Security

Glitter Bomb against Package Thieves

Stealing packages from unattended porches is a rapidly rising crime, as more of us order more things by mail. One person hid a glitter bomb and a video recorder...

MD5 and SHA-1 Still Used in 2018
From Schneier on Security

MD5 and SHA-1 Still Used in 2018

Last week, the Scientific Working Group on Digital Evidence published a draft document -- "SWGDE Position on the Use of MD5 and SHA1 Hash Algorithms in Digital...

Friday Squid Blogging: Illegal North Korean Squid Fishing
From Schneier on Security

Friday Squid Blogging: Illegal North Korean Squid Fishing

North Korea is engaged in even more illegal squid fishing than previously. As usual, you can also use this squid post to talk about the security stories in the...

Drone Denial-of-Service Attack against Gatwick Airport
From Schneier on Security

Drone Denial-of-Service Attack against Gatwick Airport

Someone is flying a drone over Gatwick Airport in order to disrupt service: Chris Woodroofe, Gatwick's chief operating officer, said on Thursday afternoon there...

Fraudulent Tactics on Amazon Marketplace
From Schneier on Security

Fraudulent Tactics on Amazon Marketplace

Fascinating article about the many ways Amazon Marketplace sellers sabotage each other and defraud customers. The opening example: framing a seller for false advertising...

Congressional Report on the 2017 Equifax Data Breach
From Schneier on Security

Congressional Report on the 2017 Equifax Data Breach

The US House of Representatives Committee on Oversight and Government Reform has just released a comprehensive report on the 2017 Equifax hack. It's a great piece...

Teaching Cybersecurity Policy
From Schneier on Security

Teaching Cybersecurity Policy

Peter Swire proposes a a pedagogic framework for teaching cybersecurity policy. Specifically, he makes real the old joke about adding levels to the OSI networking...

New Shamoon Variant
From Schneier on Security

New Shamoon Variant

A new variant of the Shamoon malware has destroyed signifigant amounts of data at a UAE "heavy engineering company" and the Italian oil and gas contractor Saipem...

Real-Time Attacks Against Two-Factor Authentication
From Schneier on Security

Real-Time Attacks Against Two-Factor Authentication

Attackers are targeting two-factor authentication systems: Attackers working on behalf of the Iranian government collected detailed information on targets and used...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account