acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorBruce Schneier
bg-corner

Inmates Secretly Build and Network Computers while in Prison
From Schneier on Security

Inmates Secretly Build and Network Computers while in Prison

This is kind of amazing: Inmates at a medium-security Ohio prison secretly assembled two functioning computers, hid them in the ceiling, and connected them to the...

Who Are the Shadow Brokers?
From Schneier on Security

Who Are the Shadow Brokers?

In 2013, a mysterious group of hackers that calls itself the Shadow Brokers stole a few disks full of NSA secrets. Since last summer, they've been dumping these...

Tainted Leaks
From Schneier on Security

Tainted Leaks

Last year, I wrote about the potential for doxers to alter documents before they leaked them. It was a theoretical threat when I wrote it, but now Citizen Lab has...

Friday Squid Blogging: Squid and Chips
From Schneier on Security

Friday Squid Blogging: Squid and Chips

The excellent Montreal chef Marc-Olivier Frappier, of Joe Beef fame, has created a squid and chips dish for Brit & Chips restaurant. As usual, you can also use...

Forbes Names Beyond Fear as One of the "13 Books Technology Executives Should Have On Their Shelves"
From Schneier on Security

Forbes Names Beyond Fear as One of the "13 Books Technology Executives Should Have On Their Shelves"

It's a good list....

Hacking the Galaxy S8's Iris Biometric
From Schneier on Security

Hacking the Galaxy S8's Iris Biometric

It was easy: The hackers took a medium range photo of their subject with a digital camera's night mode, and printed the infrared image. Then, presumably to give...

Security and Human Behavior (SHB 2017)
From Schneier on Security

Security and Human Behavior (SHB 2017)

I'm in Cambridge University, at the tenth Workshop on Security and Human Behavior. SHB is a small invitational gathering of people studying various aspects of the...

Ransomware and the Internet of Things
From Schneier on Security

Ransomware and the Internet of Things

As devastating as the latest widespread ransomware attacks have been, it's a problem with a solution. If your copy of Windows is relatively current and you've kept...

Hacking Fingerprint Readers with Master Prints
From Schneier on Security

Hacking Fingerprint Readers with Master Prints

There's interesting research on using a set of "master" digital fingerprints to fool biometric readers. The work is theoretical at the moment, but they might be...

ICE is Using Stingray to Track Illegal Immigrants
From Schneier on Security

ICE is Using Stingray to Track Illegal Immigrants

According to court documents, US Immigration and Customs Enforcement is using Stingray cell-site simulators to track illegal immigrants....

The Future of Ransomware
From Schneier on Security

The Future of Ransomware

Ransomware isn't new, but it's increasingly popular and profitable. The concept is simple: Your computer gets infected with a virus that encrypts your files until...

North Korean Cyberwar Capabilities
From Schneier on Security

North Korean Cyberwar Capabilities

Reuters has an article on North Korea's cyberwar capabilities, specifically "Unit 180." They're still not in the same league as the US, UK, Russia, China, and Israel...

Extending the Airplane Laptop Ban
From Schneier on Security

Extending the Airplane Laptop Ban

The Department of Homeland Security is rumored to be considering extending the current travel ban on large electronics for Middle Eastern flights to European ones...

Friday Squid Blogging: Giant Squid Caught Off the Coast of Ireland
From Schneier on Security

Friday Squid Blogging: Giant Squid Caught Off the Coast of Ireland

It's rare: Fishermen caught a 19-foot-long giant squid off the coast of Ireland on Monday, only the fifth to be seen there since 1673. Also the first in 22 years...

NSA Abandons "About" Searches
From Schneier on Security

NSA Abandons "About" Searches

Earlier this month, the NSA said that it would no longer conduct "about" searches of bulk communications data. This was the practice of collecting the communications...

WannaCry Ransomware
From Schneier on Security

WannaCry Ransomware

Criminals go where the money is, and cybercriminals are no exception. And right now, the money is in ransomware. ' It's a simple scam. Encrypt the victim's hard...

Human Rights Watch Needs an Information Security Director
From Schneier on Security

Human Rights Watch Needs an Information Security Director

I'm sure it pays less than the industry average, and the stakes are much higher than the average. But if you want to be a Director of Information Security that...

The US Senate Is Using Signal
From Schneier on Security

The US Senate Is Using Signal

The US Senate just approved Signal for staff use. Signal is a secure messaging app with no backdoor, and no large corporate owner who can be pressured to install...

Keylogger Found in HP Laptop Audio Drivers
From Schneier on Security

Keylogger Found in HP Laptop Audio Drivers

This is a weird story: researchers have discovered that an audio driver installed in some HP laptops includes a keylogger, which records all keystrokes to a local...

Did North Korea Write WannaCry?
From Schneier on Security

Did North Korea Write WannaCry?

The New York Times is reporting that evidence is pointing to North Korea as the author of the WannaCry ransomware. Note that there is no proof at this time, although...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account