acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorBruce Schneier
bg-corner

Israeli Scientists Accidentally Reveal Classified Information
From Schneier on Security

Israeli Scientists Accidentally Reveal Classified Information

According to this story (non-paywall English version here), Israeli scientists released some information to the public they shouldn't have. Defense establishment...

After Section 702 Reauthorization
From Schneier on Security

After Section 702 Reauthorization

For over a decade, civil libertarians have been fighting government mass surveillance of innocent Americans over the Internet. We've just lost an important battle...

Subway Elevators and Movie-Plot Threats
From Schneier on Security

Subway Elevators and Movie-Plot Threats

Local residents are opposing adding an elevator to a subway station because terrorists might use it to detonate a bomb. No, really. There's no actual threat analysis...

Locating Secret Military Bases via Fitness Data
From Schneier on Security

Locating Secret Military Bases via Fitness Data

In November, the company Strava released an anonymous data-visualization map showing all the fitness activity by everyone using the app. Over this weekend, someone...

Estimating the Cost of Internet Insecurity
From Schneier on Security

Estimating the Cost of Internet Insecurity

It's really hard to estimate the cost of an insecure Internet. Studies are all over the map. A methodical study by RAND is the best work I've seen at trying to...

Friday Squid Blogging: Squid that Mate, Die, and Then Sink
From Schneier on Security

Friday Squid Blogging: Squid that Mate, Die, and Then Sink

The mating and death characteristics of some squid are fascinating. Research paper. As usual, you can also use this squid post to talk about the security stories...

The Effects of the Spectre and Meltdown Vulnerabilities
From Schneier on Security

The Effects of the Spectre and Meltdown Vulnerabilities

On January 3, the world learned about a series of major security vulnerabilities in modern microprocessors. Called Spectre and Meltdown, these vulnerabilities were...

WhatsApp Vulnerability
From Schneier on Security

WhatsApp Vulnerability

A new vulnerability in WhatsApp has been discovered: ...the researchers unearthed far more significant gaps in WhatsApp's security: They say that anyone who controls...

Detecting Drone Surveillance with Traffic Analysis
From Schneier on Security

Detecting Drone Surveillance with Traffic Analysis

This is clever: Researchers at Ben Gurion University in Beer Sheva, Israel have built a proof-of-concept system for counter-surveillance against spy drones that...

New Malware Hijacks Cryptocurrency Mining
From Schneier on Security

New Malware Hijacks Cryptocurrency Mining

This is a clever attack. After gaining control of the coin-mining software, the malware replaces the wallet address the computer owner uses to collect newly minted...

Skygofree: New Government Malware for Android
From Schneier on Security

Skygofree: New Government Malware for Android

Kaspersky Labs is reporting on a new piece of sophisticated malware: We observed many web landing pages that mimic the sites of mobile operators and which are used...

Dark Caracal: Global Espionage Malware from Lebanon
From Schneier on Security

Dark Caracal: Global Espionage Malware from Lebanon

The EFF and Lookout are reporting on a new piece of spyware operating out of Lebanon. It primarily targets mobile devices compromised by fake secure messaging clients...

Friday Squid Blogging: Te Papa Colossal Squid Exhibition Is Being Renovated
From Schneier on Security

Friday Squid Blogging: Te Papa Colossal Squid Exhibition Is Being Renovated

The New Zealand home of the colossal squid exhibit is behind renovated. As usual, you can also use this squid post to talk about the security stories in the news...

Security Breaches Don't Affect Stock Price
From Schneier on Security

Security Breaches Don't Affect Stock Price

Interesting research: "Long-term market implications of data breaches, not," by Russell Lange and Eric W. Burger. Abstract: This report assesses the impact disclosure...

Student Cracks Inca Knot Code
From Schneier on Security

Student Cracks Inca Knot Code

Interesting....

Article from a Former Chinese PLA General on Cyber Sovereignty
From Schneier on Security

Article from a Former Chinese PLA General on Cyber Sovereignty

Interesting article by Major General Hao Yeli, Chinese People's Liberation Army (ret.), a senior advisor at the China International Institute for Strategic Society...

Jim Risen Writes about Reporting Government Secrets
From Schneier on Security

Jim Risen Writes about Reporting Government Secrets

Jim Risen writes a long and interesting article about his battles with the US government and the New York Times to report government secrets....

Fighting Ransomware
From Schneier on Security

Fighting Ransomware

No More Ransom is a central repository of keys and applications for ransomware, so people can recover their data without paying. It's not complete, of course, but...

Friday Squid Blogging: Japanese "Dude Food" Includes Squid
From Schneier on Security

Friday Squid Blogging: Japanese "Dude Food" Includes Squid

This seems to be a trend. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting...

XKCD's Smartphone Security System
From Schneier on Security

XKCD's Smartphone Security System

Funny....
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account