acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorBruce Schneier
bg-corner

"Santa Claus is Coming to Town" Parody
From Schneier on Security

"Santa Claus is Coming to Town" Parody

Funny....

Friday Squid Blogging: Gonatus Squid Eating a Dragonfish
From Schneier on Security

Friday Squid Blogging: Gonatus Squid Eating a Dragonfish

There's a video: Last July, Choy was on a ship off the shore of Monterey Bay, looking at the video footage transmitted by an ROV many feet below. A Gonatus squid...

Amazon's Door Lock Is Amazon's Bid to Control Your Home
From Schneier on Security

Amazon's Door Lock Is Amazon's Bid to Control Your Home

Interesting essay about Amazon's smart lock: When you add Amazon Key to your door, something more sneaky also happens: Amazon takes over. You can leave your keys...

Security Vulnerability in Apple's HomeKit
From Schneier on Security

Security Vulnerability in Apple's HomeKit

The story of the recent vulnerability in Apple's HomeKit....

Details on the Mirai Botnet Authors
From Schneier on Security

Details on the Mirai Botnet Authors

Brian Krebs has a long article on the Mirai botnet authors, who pled guilty....

GCHQ Found -- and Disclosed -- a Windows 10 Vulnerability
From Schneier on Security

GCHQ Found -- and Disclosed -- a Windows 10 Vulnerability

Now this is good news. The UK's National Cyber Security Centre (NCSC) -- part of GCHQ -- found a serious vulnerability in Windows Defender (their anti-virus component)...

Lessons Learned from the Estonian National ID Security Flaw
From Schneier on Security

Lessons Learned from the Estonian National ID Security Flaw

Estonia recently suffered a major flaw in the security of their national ID card. This article discusses the fix and the lessons learned from the incident: In the...

Friday Squid Blogging: Baby Sea Otters Prefer Shrimp to Squid
From Schneier on Security

Friday Squid Blogging: Baby Sea Otters Prefer Shrimp to Squid

At least, this one does. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting...

Tracking People Without GPS
From Schneier on Security

Tracking People Without GPS

Interesting research: The trick in accurately tracking a person with this method is finding out what kind of activity they're performing. Whether they're walking...

Security Planner
From Schneier on Security

Security Planner

Security Planner is a custom security advice tool from Citizen Lab. Answer a few questions, and it gives you a few simple things you can do to improve your security...

E-Mail Tracking
From Schneier on Security

E-Mail Tracking

Good article on the history and practice of e-mail tracking: The tech is pretty simple. Tracking clients embed a line of code in the body of an email­ -- usually...

Remote Hack of a Boeing 757
From Schneier on Security

Remote Hack of a Boeing 757

Last month, the DHS announced that it was able to remotely hack a Boeing 757: "We got the airplane on Sept. 19, 2016. Two days later, I was successful in accomplishing...

Surveillance inside the Body
From Schneier on Security

Surveillance inside the Body

The FDA has approved a pill with an embedded sensor that can report when it is swallowed. The pill transmits information to a wearable patch, which in turn transmits...

Friday Squid Blogging: Squid Embryos Coming to Life
From Schneier on Security

Friday Squid Blogging: Squid Embryos Coming to Life

Beautiful video. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines...

Security Vulnerabilities in Certificate Pinning
From Schneier on Security

Security Vulnerabilities in Certificate Pinning

New research found that many banks offer certificate pinning as a security feature, but fail to authenticate the hostname. This leaves the systems open to man-in...

Germany Preparing Backdoor Law
From Schneier on Security

Germany Preparing Backdoor Law

The German Interior Minister is preparing a bill that allows the government to mandate backdoors in encryption. No details about how likely this is to pass. I am...

Matt Blaze on Securing Voting Machines
From Schneier on Security

Matt Blaze on Securing Voting Machines

Matt Blaze's House testimony on the security of voting machines is an excellent read. (Details on the entire hearing is here.) I have not watched the video....

"Crypto" Is Being Redefined as Cryptocurrencies
From Schneier on Security

"Crypto" Is Being Redefined as Cryptocurrencies

I agree with Lorenzo Franceschi-Bicchierai, "Cryptocurrencies aren't 'crypto'": Lately on the internet, people in the world of Bitcoin and other digital currencies...

Friday Squid Blogging: Research into Squid-Eating Beaked Whales
From Schneier on Security

Friday Squid Blogging: Research into Squid-Eating Beaked Whales

Beaked whales, living off the coasts of Ireland, feed on squid. As usual, you can also use this squid post to talk about the security stories in the news that I...

Needless Panic Over a Wi-FI Network Name
From Schneier on Security

Needless Panic Over a Wi-FI Network Name

A Turkish Airlines flight made an emergency landing because someone named his wireless network (presumably from his smartphone) "bomb on board." In 2006, I wrote...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account