acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorBruce Schneier
bg-corner

NSA Brute-Force Keysearch Machine
From Schneier on Security

NSA Brute-Force Keysearch Machine

The Intercept published a story about a dedicated NSA brute-force keysearch machine being built with the help of New York University and IBM. It's based on a document...

Using Wi-Fi to Get 3D Images of Surrounding Location
From Schneier on Security

Using Wi-Fi to Get 3D Images of Surrounding Location

Interesting research: The radio signals emitted by a commercial Wi-Fi router can act as a kind of radar, providing images of the transmitter's environment, according...

The Quick vs. the Strong: Commentary on Cory Doctorow's Walkaway
From Schneier on Security

The Quick vs. the Strong: Commentary on Cory Doctorow's Walkaway

Technological advances change the world. That's partly because of what they are, but even more because of the social changes they enable. New technologies upend...

Yacht Security
From Schneier on Security

Yacht Security

Turns out, multi-million dollar yachts are no more secure than anything else out there: The ease with which ocean-going oligarchs or other billionaires can be hijacked...

Stealing Voice Prints
From Schneier on Security

Stealing Voice Prints

This article feels like hyperbole: The scam has arrived in Australia after being used in the United States and Britain. The scammer may ask several times "can you...

Interview with Ross Anderson
From Schneier on Security

Interview with Ross Anderson

Cybersecurity researcher Ross Anderson has a good interview on edge.org....

Securing Elections
From Schneier on Security

Securing Elections

Technology can do a lot more to make our elections more secure and reliable, and to ensure that participation in the democratic process is available to all. There...

Criminals are Now Exploiting SS7 Flaws to Hack Smartphone Two-Factor Authentication Systems
From Schneier on Security

Criminals are Now Exploiting SS7 Flaws to Hack Smartphone Two-Factor Authentication Systems

I've previously written about the serious vulnerabilities in the SS7 phone routing system. Basically, the system doesn't authenticate messages. Now, criminals are...

Facebook's Observations on Information Operations and the 2016 US Election
From Schneier on Security

Facebook's Observations on Information Operations and the 2016 US Election

Facebook published paper on the information operations it has seen, as well as some observations regarding the recent US election. It's interesting reading....

Using Ultrasonic Beacons to Track Users
From Schneier on Security

Using Ultrasonic Beacons to Track Users

I've previously written about ad networks using ultrasonic communications to jump from one device to another. The idea is for devices like televisions to play ultrasonic...

Friday Squid Blogging: Squid Communications
From Schneier on Security

Friday Squid Blogging: Squid Communications

In the oval squid Sepioteuthis lessoniana, males use body patterns to communicate with both females and other males: To gain insight into the visual communication...

Why is the TSA Scanning Paper?
From Schneier on Security

Why is the TSA Scanning Paper?

I've been reading a bunch of anectotal reports that the TSA is starting to scan paper separately: A passenger going through security at Kansas City International...

Forging Voice
From Schneier on Security

Forging Voice

LyreBird is a system that can accurately reproduce the voice of someone, given a large amount of sample inputs. It's pretty good -- listen to the demo here -- and...

Security of St. Jude Pacemakers
From Schneier on Security

Security of St. Jude Pacemakers

This is a good summary article about the horrible security of St. Jude pacemakers, and the history of the company not doing anything about it....

Fitbit Evidence Used in Murder Investigation
From Schneier on Security

Fitbit Evidence Used in Murder Investigation

Fitbit evidence is cited in an arrest warrant, stating that the device monitored steps by the victim after the suspect claimed she died....

Who is Publishing NSA and CIA Secrets, and Why?
From Schneier on Security

Who is Publishing NSA and CIA Secrets, and Why?

There's something going on inside the intelligence communities in at least two countries, and we have no idea what it is. Consider these three data points. One:...

Friday Squid Blogging: Live Squid Washes up on North Carolina Beach
From Schneier on Security

Friday Squid Blogging: Live Squid Washes up on North Carolina Beach

A "mysterious squid" -- big and red -- washed up on a beach in Carteret County, North Carolina. Someone found it, still alive, and set it back in the water after...

Jumping Airgaps with a Laser and a Scanner
From Schneier on Security

Jumping Airgaps with a Laser and a Scanner

Researchers have configured two computers to talk to each other using a laser and a scanner. Scanners work by detecting reflected light on their glass pane. The...

Stealing Browsing History Using Your Phone's Ambient Light Sensor
From Schneier on Security

Stealing Browsing History Using Your Phone's Ambient Light Sensor

There has been a flurry of research into using the various sensors on your phone to steal data in surprising ways. Here's another: using the phone's ambient light...

Reading Analytics and Privacy
From Schneier on Security

Reading Analytics and Privacy

Interesting paper: "The rise of reading analytics and the emerging calculus of reading privacy in the digital world," by Clifford Lynch: Abstract: This paper studies...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account