acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorBruce Schneier
bg-corner

Subverting Backdoored Encrryption
From Schneier on Security

Subverting Backdoored Encrryption

This is a really interesting research result. This paper proves that two parties can create a secure communications cannel using a communications system with a...

Public Hearing on IoT Risks
From Schneier on Security

Public Hearing on IoT Risks

The US Consumer Product Safety Commission is holding hearings on IoT risks: The U.S. Consumer Product Safety Commission (CPSC, Commission, or we) will conduct a...

Musical Ciphers
From Schneier on Security

Musical Ciphers

Interesting history....

Friday Squid Blogging: Market Squid in Alaskan Waters
From Schneier on Security

Friday Squid Blogging: Market Squid in Alaskan Waters

Rising sea temperatures is causing market squid to move north into Alaskan waters. As usual, you can also use this squid post to talk about the security stories...

Unlocking iPhones with Dead People's Fingerprints
From Schneier on Security

Unlocking iPhones with Dead People's Fingerprints

It's routine for US police to unlock iPhones with the fingerprints of dead people. It seems only to work with recently dead people....

Facebook and Cambridge Analytica
From Schneier on Security

Facebook and Cambridge Analytica

In the wake of the Cambridge Analytica scandal, news articles and commentators have focused on what Facebook knows about us. A lot, it turns out. It collects data...

Another Branch Prediction Attack
From Schneier on Security

Another Branch Prediction Attack

When Spectre and Meltdown were first announced earlier this year, pretty much everyone predicted that there would be many more attacks targeting branch prediction...

Breaking the Anonymity in the Cryptocurrency Monero
From Schneier on Security

Breaking the Anonymity in the Cryptocurrency Monero

Researchers have exploited a flaw in the cryptocurrency Monero to break the anonymity of transactions. Research paper. BoingBoing post....

Tracing Stolen Bitcoin
From Schneier on Security

Tracing Stolen Bitcoin

Ross Anderson has a really interesting paper on tracing stolen bitcoin. From a blog post: Previous attempts to track tainted coins had used either the "poison"...

Fooling Face Recognition with Infrared Light
From Schneier on Security

Fooling Face Recognition with Infrared Light

Yet another development in the arms race between facial recognition systems and facial-recognition-system foolers. BoingBoing post....

Adding Backdoors at the Chip Level
From Schneier on Security

Adding Backdoors at the Chip Level

Interesting research into undetectably adding backdoors into computer chips during manufacture: "Stealthy dopant-level hardware Trojans: extended version," also...

Friday Squid Blogging: Giant Squid Stealing Food from Each Other
From Schneier on Security

Friday Squid Blogging: Giant Squid Stealing Food from Each Other

An interesting hunting strategy: Off of northern Spain, giant squid often feed on schools of fish called blue whiting. The schools swim 400 meters or less below...

Zeynep Tufekci on Facebook and Cambridge Analytica
From Schneier on Security

Zeynep Tufekci on Facebook and Cambridge Analytica

Zeynep Tufekci is particularly cogent about Facebook and Cambridge Analytica. Several news outlets asked me to write about this issue. I didn't, because 1) my book...

GreyKey iPhone Unlocker
From Schneier on Security

GreyKey iPhone Unlocker

Some details about the iPhone unlocker from the US company Greyshift, with photos. Little is known about Grayshift or its sales model at this point. We don't know...

Reverse Engineering the Cuban Sonic Weapon
From Schneier on Security

Reverse Engineering the Cuban Sonic Weapon

Interesting analysis and speculation....

Hijacking Computers for Cryptocurrency Mining
From Schneier on Security

Hijacking Computers for Cryptocurrency Mining

Interesting paper "A first look at browser-based cryptojacking": Abstract: In this paper, we examine the recent trend towards in-browser mining of cryptocurrencies...

Dan Geer on the Dangers of Computer-Only Systems
From Schneier on Security

Dan Geer on the Dangers of Computer-Only Systems

A good warning, delivered in classic Dan Geer style....

Israeli Security Attacks AMD by Publishing Zero-Day Exploits
From Schneier on Security

Israeli Security Attacks AMD by Publishing Zero-Day Exploits

Last week, the Israeli security company CTS Labs published a series of exploits against AMD chips. The publication came with the flashy website, detailed whitepaper...

Friday Squid Blogging: New Squid Species Discovered in Australia
From Schneier on Security

Friday Squid Blogging: New Squid Species Discovered in Australia

A new species of pygmy squid was discovered in Western Australia. It's pretty cute. As usual, you can also use this squid post to talk about the security stories...

Interesting Article on Marcus Hutchins
From Schneier on Security

Interesting Article on Marcus Hutchins

This is a good article on the complicated story of hacker Marcus Hutchins....
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account