acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorBruce Schneier
bg-corner

Many Android Phones Vulnerable to Attacks Over Malicious Wi-Fi Networks
From Schneier on Security

Many Android Phones Vulnerable to Attacks Over Malicious Wi-Fi Networks

There's ablog post from Google's Project Zero detailing an attack against Android phones over Wi-Fi. From Ars Technica: The vulnerability resides in a widely used...

APT10 and Cloud Hopper
From Schneier on Security

APT10 and Cloud Hopper

There's a new report of a nation-state attack, presumed to be from China, on a series of managed ISPs. From the executive summary: Since late 2016, PwC UK and BAE...

Clever Physical ATM Attack
From Schneier on Security

Clever Physical ATM Attack

This is an interesting combination of computer and physical attack: Researchers from the Russian security firm Kaspersky on Monday detailed a new ATM-emptying attack...

Encryption Policy and Freedom of the Press
From Schneier on Security

Encryption Policy and Freedom of the Press

Interesting law journal article: "Encryption and the Press Clause," by D. Victoria Barantetsky. Abstract: Almost twenty years ago, a hostile debate over whether...

Acoustic Attack Against Accelerometers
From Schneier on Security

Acoustic Attack Against Accelerometers

Interesting acoustic attack against the MEMS accelerometers in devices like FitBits. Millions of accelerometers reside inside smartphones, automobiles, medical...

Soon You'll Be Able to Hijack Weaponized Police Drones in Connecticut
From Schneier on Security

Soon You'll Be Able to Hijack Weaponized Police Drones in Connecticut

Not content with having a fleet of insecure surveillance drones, the state of Connecticut wants a fleet of insecure weaponized drones. What could possibly go wrong...

Friday Squid Blogging: 1887 Animal-Combat Print with Giant Squid
From Schneier on Security

Friday Squid Blogging: 1887 Animal-Combat Print with Giant Squid

Great Victorian animal-combat scene featuring a giant squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven't...

Finding FBI Director James Comey's Twitter Account
From Schneier on Security

Finding FBI Director James Comey's Twitter Account

An interesting story of uncovering an anonymous Internet social media account....

Congress Removes FCC Privacy Protections on Your Internet Usage
From Schneier on Security

Congress Removes FCC Privacy Protections on Your Internet Usage

Think about all of the websites you visit every day. Now imagine if the likes of Time Warner, AT&T, and Verizon collected all of your browsing history and sold...

Security Orchestration and Incident Response
From Schneier on Security

Security Orchestration and Incident Response

Last month at the RSA Conference, I saw a lot of companies selling security incident response automation. Their promise was to replace people with computers ­--...

Kalyna Block Cipher
From Schneier on Security

Kalyna Block Cipher

Kalyna is a block cipher that became a Ukrainian national standard in 2015. It supports block and key sizes of 128, 256, and 512 bits. Its structure looks like...

The TSA's Selective Laptop Ban
From Schneier on Security

The TSA's Selective Laptop Ban

Last Monday, the TSA announced a peculiar new security measure to take effect within 96 hours. Passengers flying into the US on foreign airlines from eight Muslim...

Friday Squid Blogging: Squid from Utensils
From Schneier on Security

Friday Squid Blogging: Squid from Utensils

Available on eBay. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Commenting Policy for This Blog
From Schneier on Security

Commenting Policy for This Blog

Over the past few months, I have been watching my blog comments decline in civility. I blame it in part on the contentious US election and its aftermath. It's also...

Second WikiLeaks Dump of CIA Documents
From Schneier on Security

Second WikiLeaks Dump of CIA Documents

There are more CIA documents up on WikiLeaks. It seems to be mostly MacOS and iOS. News article....

Hackers Threaten to Erase Apple Customer Data
From Schneier on Security

Hackers Threaten to Erase Apple Customer Data

Turkish hackers are threatening to erase millions of iCloud user accounts unless Apple pays a ransom. This is a weird story, and I'm skeptical of some of the details...

NSA Best Scientific Cybersecurity Paper Competition
From Schneier on Security

NSA Best Scientific Cybersecurity Paper Competition

Every year, the NSA has a competition for the best cybersecurity paper. Winners get to go to the NSA to pick up the award. (Warning: you will almost certainly be...

New Paper on Encryption Workarounds
From Schneier on Security

New Paper on Encryption Workarounds

I have written a paper with Orin Kerr on encryption workarounds. Our goal wasn't to make any policy recommendations. (That was a good thing, since we probably don't...

NSA Documents from before 1930
From Schneier on Security

NSA Documents from before 1930

Here is a listing of all the documents that the NSA has in its archives that are dated earlier than 1930....

WikiLeaks Not Disclosing CIA-Hoarded Vulnerabilities to Companies
From Schneier on Security

WikiLeaks Not Disclosing CIA-Hoarded Vulnerabilities to Companies

WikiLeaks has started publishing a large collection of classified CIA documents, including information on several -- possibly many -- unpublished (i.e., zero-day)...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account