acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorBruce Schneier
bg-corner

New iPhone OS May Include Device-Unlocking Security
From Schneier on Security

New iPhone OS May Include Device-Unlocking Security

iOS 12, the next release of Apple's iPhone operating system, may include features to prevent someone from unlocking your phone without your permission: The feature...

Router Vulnerability and the VPNFilter Botnet
From Schneier on Security

Router Vulnerability and the VPNFilter Botnet

On May 25, the FBI asked us all to reboot our routers. The story behind this request is one of sophisticated malware and unsophisticated home-network security,...

Friday Squid Blogging: Extinct Relatives of Squid
From Schneier on Security

Friday Squid Blogging: Extinct Relatives of Squid

Interesting fossils. Note that a poster is available. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered...

New Data Privacy Regulations
From Schneier on Security

New Data Privacy Regulations

When Marc Zuckerberg testified before both the House and the Senate last month, it became immediately obvious that few US lawmakers had any appetite to regulate...

An Example of Deterrence in Cyberspace
From Schneier on Security

An Example of Deterrence in Cyberspace

In 2016, the US was successfully deterred from attacking Russia in cyberspace because of fears of Russian capabilities against the US. I have two citations for...

The Habituation of Security Warnings
From Schneier on Security

The Habituation of Security Warnings

We all know that it happens: when we see a security warning too often -- and without effect -- we start tuning it out. A new paper uses fMRI, eye tracking, and...

Regulating Bitcoin
From Schneier on Security

Regulating Bitcoin

Ross Anderson has a new paper on cryptocurrency exchanges. From his blog: Bitcoin Redux explains what's going wrong in the world of cryptocurrencies. The bitcoin...

E-Mail Vulnerabilities and Disclosure
From Schneier on Security

E-Mail Vulnerabilities and Disclosure

Last week, researchers disclosed vulnerabilities in a large number of encrypted email clients: specifically, those that use OpenPGP and S/MIME, including Thunderbird...

Friday Squid Blogging: Do Cephalopods Contain Alien DNA?
From Schneier on Security

Friday Squid Blogging: Do Cephalopods Contain Alien DNA?

Maybe not DNA, but biological somethings. "Cause of Cambrian explosion -- Terrestrial or Cosmic?": Abstract: We review the salient evidence consistent with or predicted...

Damaging Hard Drives with an Ultrasonic Attack
From Schneier on Security

Damaging Hard Drives with an Ultrasonic Attack

Playing a sound over the speakers can cause computers to crash and possibly even physically damage the hard drive. Academic paper....

1834: The First Cyberattack
From Schneier on Security

1834: The First Cyberattack

Tom Standage has a great story of the first cyberattack against a telegraph network. The Blanc brothers traded government bonds at the exchange in the city of Bordeaux...

Numbers Stations
From Schneier on Security

Numbers Stations

On numbers stations....

Kidnapping Fraud
From Schneier on Security

Kidnapping Fraud

Fake kidnapping fraud: "Most commonly we have unsolicited calls to potential victims in Australia, purporting to represent the people in authority in China and...

Friday Squid Blogging: Squid Comic
From Schneier on Security

Friday Squid Blogging: Squid Comic

It's not very good, but it has a squid in it. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Security and Human Behavior (SHB 2018)
From Schneier on Security

Security and Human Behavior (SHB 2018)

I'm at Carnegie Mellon University, at the eleventh Workshop on Security and Human Behavior. SHB is a small invitational gathering of people studying various aspects...

Detecting Lies through Mouse Movements
From Schneier on Security

Detecting Lies through Mouse Movements

Interesting research: "The detection of faked identity using unexpected questions and mouse dynamics," by Merulin Monaro, Luciano Gamberini, and Guiseppe Sartori...

Font Steganography
From Schneier on Security

Font Steganography

Interesting research in steganography at the font level....

Supermarket Shoplifting
From Schneier on Security

Supermarket Shoplifting

The rise of self-checkout has caused a corresponding rise in shoplifting....

Another Spectre-Like CPU Vulnerability
From Schneier on Security

Another Spectre-Like CPU Vulnerability

Google and Microsoft researchers have disclosed another Spectre-like CPU side-channel vulnerability, called "Speculative Store Bypass." Like the others, the fix...

Japan's Directorate for Signals Intelligence
From Schneier on Security

Japan's Directorate for Signals Intelligence

The Intercept has a long article on Japan's equivalent of the NSA: the Directorate for Signals Intelligence. Interesting, but nothing really surprising. The directorate...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account