acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorBruce Schneier
bg-corner

Hacking Police Bodycams
From Schneier on Security

Hacking Police Bodycams

Suprising no one, the security of police bodycams is terrible. Mitchell even realized that because he can remotely access device storage on models like the Fire...

Google Tracks its Users Even if They Opt-Out of Tracking
From Schneier on Security

Google Tracks its Users Even if They Opt-Out of Tracking

Google is tracking you, even if you turn off tracking: Google says that will prevent the company from remembering where you've been. Google's support page on the...

Identifying Programmers by their Coding Style
From Schneier on Security

Identifying Programmers by their Coding Style

Fascinating research de-anonymizing code -- from either source code or compiled code: Rachel Greenstadt, an associate professor of computer science at Drexel University...

Friday Squid Blogging: New Tool for Grabbing Squid and other Fragile Sea Creatures
From Schneier on Security

Friday Squid Blogging: New Tool for Grabbing Squid and other Fragile Sea Creatures

Interesting video of a robot grabber that's delicate enough to capture squid (and even jellyfish) in the ocean. As usual, you can also use this squid post to talk...

xkcd on Voting Computers
From Schneier on Security

xkcd on Voting Computers

Funny and true....

Don't Fear the TSA Cutting Airport Security. Be Glad That They're Talking about It.
From Schneier on Security

Don't Fear the TSA Cutting Airport Security. Be Glad That They're Talking about It.

Last week, CNN reported that the Transportation Security Administration is considering eliminating security at U.S. airports that fly only smaller planes -- 60...

Detecting Phishing Sites with Machine Learning
From Schneier on Security

Detecting Phishing Sites with Machine Learning

Really interesting article: A trained eye (or even a not-so-trained one) can discern when something phishy is going on with a domain or subdomain name. There are...

SpiderOak's Warrant Canary Died
From Schneier on Security

SpiderOak's Warrant Canary Died

BoingBoing has the story. I have never quite trusted the idea of a warrant canary. But here it seems to have worked. (Presumably, if SpiderOak wanted to replace...

Measuring the Rationality of Security Decisions
From Schneier on Security

Measuring the Rationality of Security Decisions

Interesting research: "Dancing Pigs or Externalities? Measuring the Rationality of Security Decisions": Abstract: Accurately modeling human decision-making in security...

Hacking the McDonald's Monopoly Sweepstakes
From Schneier on Security

Hacking the McDonald's Monopoly Sweepstakes

Long and interesting story -- now two decades old -- of massive fraud perpetrated against the McDonald's Monopoly sweepstakes. The central fraudster was the person...

Friday Squid Blogging: Calamari Squid Catching Prey
From Schneier on Security

Friday Squid Blogging: Calamari Squid Catching Prey

The calamari squid grabs prey three feet away with its fast tentacles. As usual, you can also use this squid post to talk about the security stories in the news...

Three of My Books Are Available in DRM-Free E-Book Format
From Schneier on Security

Three of My Books Are Available in DRM-Free E-Book Format

Humble Bundle sells groups of e-books at ridiculously low prices, DRM free. This month, the bundles are all Wiley titles, including three of my books: Applied Cryptography...

How the US Military Can Better Keep Hackers
From Schneier on Security

How the US Military Can Better Keep Hackers

Interesting commentary: The military is an impossible place for hackers thanks to antiquated career management, forced time away from technical positions, lack...

Using In-Game Purchases to Launder Money
From Schneier on Security

Using In-Game Purchases to Launder Money

Evidence that stolen credit cards are being used to purchase items in games like Clash of Clans, which are then resold for cash....

GCHQ on Quantum Key Distribution
From Schneier on Security

GCHQ on Quantum Key Distribution

The UK's GCHQ delivers a brutally blunt assessment of quantum key distribution: QKD protocols address only the problem of agreeing keys for encrypting data. Ubiquitous...

Backdoors in Cisco Routers
From Schneier on Security

Backdoors in Cisco Routers

We don't know if this is error or deliberate action, but five backdoors have been discovered already this year....

Hacking a Robot Vacuum
From Schneier on Security

Hacking a Robot Vacuum

The Diqee 360 robotic vacuum cleaner can be turned into a surveillance device. The attack requires physical access to the device, so in the scheme of things it's...

The Poor Cybersecurity of US Space Assets
From Schneier on Security

The Poor Cybersecurity of US Space Assets

Good policy paper (summary here) on the threats, current state, and potential policy solutions for the poor security of US space systems....

Identifying People by Metadata
From Schneier on Security

Identifying People by Metadata

Interesting research: "You are your Metadata: Identification and Obfuscation of Social Media Users using Metadata Information," by Beatrice Perez, Mirco Musolesi...

Friday Squid Blogging: Squid Deception
From Schneier on Security

Friday Squid Blogging: Squid Deception

This is a fantastic video of a squid attracting prey with a tentacle that looks like a smaller squid. As usual, you can also use this squid post to talk about the...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account