acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Defense Against Doxing
From Schneier on Security

Defense Against Doxing

A decade ago, I wrote about the death of ephemeral conversation. As computers were becoming ubiquitous, some unintended changes happened, too. Before computers,...

Google Discloses Details of an Unpatched Microsoft Vulnerability
From Schneier on Security

Google Discloses Details of an Unpatched Microsoft Vulnerability

Google's Project Zero is serious about releasing the details of security vulnerabilities 90 days after they alert the vendors, even if they're unpatched. It just...

More on the CIA Document Leak
From Schneier on Security

More on the CIA Document Leak

If I had to guess right now, I'd say the documents came from an outsider and not an insider. My reasoning: One, there is absolutely nothing illegal in the contents...

The US Has Been Conducting Offensive Cyberattacks against North Korea
From Schneier on Security

The US Has Been Conducting Offensive Cyberattacks against North Korea

The New York Times is reporting that the US has been conducting offensive cyberattacks against North Korea, in an effort to delay its nuclear weapons program......

WikiLeaks Releases CIA Hacking Tools
From Schneier on Security

WikiLeaks Releases CIA Hacking Tools

WikiLeaks just released a cache of 8,761 classified CIA documents from 2012 to 2016, including details of its offensive Internet operations. I have not read through...

Building Smarter Ransomware
From Schneier on Security

Building Smarter Ransomware

Matthew Green and students speculate on what truly well-designed ransomware system could look like: Most modern ransomware employs a cryptocurrency like Bitcoin...

Howard Schmidt
From Schneier on Security

Howard Schmidt

Longtime Internet security-policy pioneer Howard Schmidt died on Friday. He will be missed....

Uber Uses Ubiquitous Surveillance to Identify and Block Regulators
From Schneier on Security

Uber Uses Ubiquitous Surveillance to Identify and Block Regulators

The New York Times reports that Uber developed apps that identified and blocked government regulators using the app to find evidence of illegal behavior: Yet using...

Friday Squid Blogging: When Squid Evolved
From Schneier on Security

Friday Squid Blogging: When Squid Evolved

Squid evolved during an "evolutionary war" -- the Mesozoic Marine Revolution -- about 100 million years ago. Research paper. As usual, you can also use this squid...

Me at the RSA Conference
From Schneier on Security

Me at the RSA Conference

This is my talk at the RSA Conference last month. It's on regulation and the Internet of Things, along the lines of this essay. I am slowly meandering around this...

Hacking Marconi's Wireless in 1903
From Schneier on Security

Hacking Marconi's Wireless in 1903

A delightful story....

Jumping Air Gaps with Blinking Lights and Drones
From Schneier on Security

Jumping Air Gaps with Blinking Lights and Drones

Researchers have demonstrated how a malicious piece of software in an air-gapped computer can communicate with a nearby drone using a blinking LED on the computer...

Buzzword Watch: Prosilience
From Schneier on Security

Buzzword Watch: Prosilience

Summer Fowler at CMU has invented a new word: prosilience: I propose that we build operationally PROSILIENT organizations. If operational resilience, as we like...

Botnets
From Schneier on Security

Botnets

Botnets have existed for at least a decade. As early as 2000, hackers were breaking into computers over the Internet and controlling them en masse from centralized...

"Proof Mode" for your Smartphone Camera
From Schneier on Security

"Proof Mode" for your Smartphone Camera

ProofMode is an app for your smartphone that adds data to the photos you take to prove that they are real and unaltered: On the technical front, what the app is...

EU Still Concerned about Windows 10 Privacy Settings
From Schneier on Security

EU Still Concerned about Windows 10 Privacy Settings

We all should be concerned about the privacy settings in Windows 10. And we should be glad that the EU has the regulatory authority to do something about it....

Adm. Rogers Talks about Buying Cyberweapons
From Schneier on Security

Adm. Rogers Talks about Buying Cyberweapons

At a talk last week, the head of US Cyber Command and the NSA Mike Rogers talked about the US buying cyberweapons from arms manufacturers. "In the application of...

A Survey of Propaganda
From Schneier on Security

A Survey of Propaganda

This is an excellent survey article on modern propaganda techniques, how they work, and how we might defend ourselves against them. Cory Doctorow summarizes the...

Friday Squid Blogging: Squid Short Story
From Schneier on Security

Friday Squid Blogging: Squid Short Story

A short SF story in a tweet. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

My TEDMED Talk on Medical Data Privacy
From Schneier on Security

My TEDMED Talk on Medical Data Privacy

Last November, I gave a talk at the TEDMED Conference on health and medical data privacy. The talk is online...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account