acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorBruce Schneier
bg-corner

Privacy for Tigers
From Schneier on Security

Privacy for Tigers

Ross Anderson has some new work: As mobile phone masts went up across the world's jungles, savannas and mountains, so did poaching. Wildlife crime syndicates can...

How DNA Databases Violate Everyone's Privacy
From Schneier on Security

How DNA Databases Violate Everyone's Privacy

If you're an American of European descent, there's a 60% you can be uniquely identified by public information in DNA databases. This is not information that you...

Upcoming Speaking Engagements
From Schneier on Security

Upcoming Speaking Engagements

This is a current list of where and when I am scheduled to speak: I'm speaking at Data in Smarter Cities in New York City on October 23, 2018. I'm speaking at the...

Friday Squid Blogging: Eat Less Squid
From Schneier on Security

Friday Squid Blogging: Eat Less Squid

The UK's Marine Conservation Society is urging people to eat less squid. As usual, you can also use this squid post to talk about the security stories in the news...

Security in a World of Physically Capable Computers
From Schneier on Security

Security in a World of Physically Capable Computers

It's no secret that computers are insecure. Stories like the recent Facebook hack, the Equifax hack and the hacking of government agencies are remarkable for how...

Another Bloomberg Story about Supply-Chain Hardware Attacks from China
From Schneier on Security

Another Bloomberg Story about Supply-Chain Hardware Attacks from China

Bloomberg has another story about hardware surveillance implants in equipment made in China. This implant is different from the one Bloomberg reported on last week...

Security Vulnerabilities in US Weapons Systems
From Schneier on Security

Security Vulnerabilities in US Weapons Systems

The US Government Accounting Office just published a new report: "Weapons Systems Cyber Security: DOD Just Beginning to Grapple with Scale of Vulnerabilities" (summary...

Access Now Is Looking for a Chief Security Officer
From Schneier on Security

Access Now Is Looking for a Chief Security Officer

The international digital human rights organization Access Now (I am on the board) is looking to hire a Chief Security Officer. I believe that, somewhere, there...

The US National Cyber Strategy
From Schneier on Security

The US National Cyber Strategy

Last month the White House released the "National Cyber Strategy of the United States of America. I generally don't have much to say about these sorts of documents...

Defeating the "Deal or No Deal" Arcade Game
From Schneier on Security

Defeating the "Deal or No Deal" Arcade Game

Two teenagers figured out how to beat the "Deal or No Deal" arcade game by filming the computer animation than then slowing it down enough to determine where the...

Friday Squid Blogging: Watch Squid Change Colors
From Schneier on Security

Friday Squid Blogging: Watch Squid Change Colors

This is an amazing short video of a squid -- I don't know the species -- changing its color instantly. As usual, you can also use this squid post to talk about...

Detecting Credit Card Skimmers
From Schneier on Security

Detecting Credit Card Skimmers

Interesting research paper: "Fear the Reaper: Characterization and Fast Detection of Card Skimmers": Abstract: Payment card fraud results in billions of dollars...

Conspiracy Theories Around the "Presidential Alert"
From Schneier on Security

Conspiracy Theories Around the "Presidential Alert"

Noted conspiracy theorist John McAfee tweeted: The "Presidential alerts": they are capable of accessing the E911 chip in your phones - giving them full access to...

Chinese Supply Chain Hardware Attack
From Schneier on Security

Chinese Supply Chain Hardware Attack

Bloomberg is reporting about a Chinese espionage operating involving inserting a tiny chip into computer products made in China. I've written (alternate link) this...

Helen Nissenbaum on Data Privacy and Consent
From Schneier on Security

Helen Nissenbaum on Data Privacy and Consent

This is a fantastic Q&A with NYU Law Professor Helen Nissenbaum on data privacy and why it's wrong to focus on consent. I'm not going to pull a quote, because you...

The Effects of GDPR's 72-Hour Notification Rule
From Schneier on Security

The Effects of GDPR's 72-Hour Notification Rule

The EU's GDPR regulation requires companies to report a breach within 72 hours. Alex Stamos, former Facebook CISO now at Stanford University, points out how this...

Terahertz Millimeter-Wave Scanners
From Schneier on Security

Terahertz Millimeter-Wave Scanners

Interesting article on terahertz millimeter-wave scanners and their uses to detect terrorist bombers. The heart of the device is a block of electronics about the...

Sophisticated Voice Phishing Scams
From Schneier on Security

Sophisticated Voice Phishing Scams

Brian Krebs is reporting on some new and sophisticated phishing scams over the telephone. I second his advice: "never give out any information about yourself in...

Facebook Is Using Your Two-Factor Authentication Phone Number to Target Advertising
From Schneier on Security

Facebook Is Using Your Two-Factor Authentication Phone Number to Target Advertising

From Kashmir Hill: Facebook is not content to use the contact information you willingly put into your Facebook profile for advertising. It is also using contact...

More on the Five Eyes Statement on Encryption and Backdoors
From Schneier on Security

More on the Five Eyes Statement on Encryption and Backdoors

Earlier this month, I wrote about a statement by the Five Eyes countries about encryption and back doors. (Short summary: they like them.) One of the weird things...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account