acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorBruce Schneier
bg-corner

Fingerprinting Digital Documents
From Schneier on Security

Fingerprinting Digital Documents

In this era of electronic leakers, remember that zero-width spaces and homoglyph substitution can fingerprint individual instances of files....

Yet Another FBI Proposal for Insecure Communications
From Schneier on Security

Yet Another FBI Proposal for Insecure Communications

Deputy Attorney General Rosenstein has given talks where he proposes that tech companies decrease their communications and device security for the benefit of the...

Susan Landau's New Book: Listening In
From Schneier on Security

Susan Landau's New Book: Listening In

Susan Landau has written a terrific book on cybersecurity threats and why we need strong crypto. Listening In: Cybersecurity in an Insecure Age. It's based in part...

Cybersecurity and the 2017 US National Security Strategy
From Schneier on Security

Cybersecurity and the 2017 US National Security Strategy

Commentaries on the 2017 US national security strategy by Michael Sulmeyer and Ben Buchanan....

Daniel Miessler on My Writings about IoT Security
From Schneier on Security

Daniel Miessler on My Writings about IoT Security

Daniel Miessler criticizes my writings about IoT security: I know it's super cool to scream about how IoT is insecure, how it's dumb to hook up everyday objects...

NSA Morale
From Schneier on Security

NSA Morale

The Washington Post is reporting that poor morale at the NSA is causing a significant talent shortage. A November New York Times article said much the same thing...

Tourist Scams
From Schneier on Security

Tourist Scams

A comprehensive list. Most are old and obvious, but there are some clever variants....

Friday Squid Blogging: How the Optic Lobe Controls Squid Camouflage
From Schneier on Security

Friday Squid Blogging: How the Optic Lobe Controls Squid Camouflage

Experiments on the oval squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting...

Spectre and Meltdown Attacks Against Microprocessors
From Schneier on Security

Spectre and Meltdown Attacks Against Microprocessors

The security of pretty much every computer on the planet has just gotten a lot worse, and the only real solution -- which of course is not a solution -- is to throw...

New Book Coming in September: "Click Here to Kill Everybody"
From Schneier on Security

New Book Coming in September: "Click Here to Kill Everybody"

My next book is still on track for a September 2018 publication. Norton is still the publisher. The title is now Click Here to Kill Everybody: Peril and Promise...

Detecting Adblocker Blockers
From Schneier on Security

Detecting Adblocker Blockers

Interesting research on the prevalence of adblock blockers: "Measuring and Disrupting Anti-Adblockers Using Differential Execution Analysis": Abstract: Millions...

Spectre and Meltdown Attacks
From Schneier on Security

Spectre and Meltdown Attacks

After a week or so of rumors, everyone is now reporting about the Spectre and Meltdown attacks against pretty much every modern processor out there. These are side...

Tamper-Detection App for Android
From Schneier on Security

Tamper-Detection App for Android

Edward Snowden and Nathan Freitas have created an Android app that detects when it's being tampered with. The basic idea is to put the app on a second phone and...

Fake Santa Surveillance Camera
From Schneier on Security

Fake Santa Surveillance Camera

Reka makes a "decorative Santa cam," meaning that it's not a real camera. Instead, it just gets children used to being under constant surveillance. Our Santa Cam...

Security Vulnerabilities in Star Wars
From Schneier on Security

Security Vulnerabilities in Star Wars

A fun video describing some of the many Federation security vulnerabilities in the first Star Wars movie. Happy New Year, everyone....

Friday Squid Blogging: Squid Populations Are Exploding
From Schneier on Security

Friday Squid Blogging: Squid Populations Are Exploding

New research: "Global proliferation of cephalopods" Summary: Human activities have substantially changed the world's oceans in recent decades, altering marine food...

Profile of Reality Winner
From Schneier on Security

Profile of Reality Winner

New York Magazine published an excellent profile of the single-document leaker Reality Winner....

The "Extended Random" Feature in the BSAFE Crypto Library
From Schneier on Security

The "Extended Random" Feature in the BSAFE Crypto Library

Matthew Green wrote a fascinating blog post about the NSA's efforts to increase the amount of random data exposed in the TLS protocol, and how it interacts with...

Post-Quantum Algorithms
From Schneier on Security

Post-Quantum Algorithms

NIST has organized a competition for public-key algorithms secure against a quantum computer. It recently published all of its Round 1 submissions. (Details of...

Acoustical Attacks against Hard Drives
From Schneier on Security

Acoustical Attacks against Hard Drives

Interesting destructive attack: "Acoustic Denial of Service Attacks on HDDs": Abstract: Among storage components, hard disk drives (HDDs) have become the most commonly...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account