acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Analyzing WeChat
From Schneier on Security

Analyzing WeChat

Citizen Lab has analyzed how censorship works in the Chinese chat app WeChat: Key Findings: Keyword filtering on WeChat is only enabled for users with accounts...

DigiTally
From Schneier on Security

DigiTally

Ross Anderson describes DigiTally, a secure payments system for use in areas where there is little or no network connectivity....

You, Too, Can Rent the Murai Botnet
From Schneier on Security

You, Too, Can Rent the Murai Botnet

You can rent a 400,000-computer Murai botnet and DDoS anyone you like. BoingBoing post. Slashdot thread....

San Francisco Transit System Target of Ransomware
From Schneier on Security

San Francisco Transit System Target of Ransomware

It's really bad. The ticket machines were hacked. Over the next couple of years, I believe we are going to see the downside of our headlong rush to put everything...

Friday Squid Blogging: Striped Pyjama Squid
From Schneier on Security

Friday Squid Blogging: Striped Pyjama Squid

Here's a nice picture of one of the few known poisonous squids. As usual, you can also use this squid post to talk about the security stories in the news that I...

Hacking and the 2016 Presidential Election
From Schneier on Security

Hacking and the 2016 Presidential Election

Was the 2016 presidential election hacked? It's hard to tell. There were no obvious hacks on Election Day, but new reports have raised the question of whether voting...

Securing Communications in a Trump Administration
From Schneier on Security

Securing Communications in a Trump Administration

Susan Landau has an excellent essay on why it's more important than ever to have backdoor-free encryption on our computer and communications systems. Protecting...

Headphones as Microphones
From Schneier on Security

Headphones as Microphones

Surprising no one who has been following this sort of thing, headphones can be used as microphones....

Government Propaganda on Social Media
From Schneier on Security

Government Propaganda on Social Media

Vice Motherboard has an interesting article about governments using social-media platforms for propaganda and surveillance, and the companies that are supporting...

"Security for the High-Risk User"
From Schneier on Security

"Security for the High-Risk User"

Interesting paper. John Scott-Railton on securing the high-risk user....

Dumb Security Survey Questions
From Schneier on Security

Dumb Security Survey Questions

According to a Harris poll, 39% of Americans would give up sex for a year for perfect computer security: According to an online survey among over 2,000 U.S. adults...

Friday Squid Blogging: Peruvian Squid Fishermen Are Trying to Diversify
From Schneier on Security

Friday Squid Blogging: Peruvian Squid Fishermen Are Trying to Diversify

Squid catch is down, so fisherman are trying to sell more processed product. As usual, you can also use this squid post to talk about the security stories in the...

Smartphone Secretly Sends Private Data to China
From Schneier on Security

Smartphone Secretly Sends Private Data to China

This is pretty amazing: International customers and users of disposable or prepaid phones are the people most affected by the software. But the scope is unclear...

Using Wi-Fi to Detect Hand Motions and Steal Passwords
From Schneier on Security

Using Wi-Fi to Detect Hand Motions and Steal Passwords

This is impressive research: "When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals": Abstract: In this study, we present WindTalker...

Hacking Password-Protected Computers via the USB Port
From Schneier on Security

Hacking Password-Protected Computers via the USB Port

PoisonTap is an impressive hacking tool that can compromise computers via the USB port, even when they are password protected. What's interesting is the chain of...

Mass Spectrometry for Surveillance
From Schneier on Security

Mass Spectrometry for Surveillance

Yet another way to collect personal data on people without their knowledge or consent: "Lifestyle chemistries from phones for individual profiling": Abstract: Imagine...

Election Security
From Schneier on Security

Election Security

It's over. The voting went smoothly. As of the time of writing, there are no serious fraud allegations, nor credible evidence that anyone hacked the voting rolls...

Fake HP Printer That's Actually a Cellular Eavesdropping Device
From Schneier on Security

Fake HP Printer That's Actually a Cellular Eavesdropping Device

Julian Oliver has designed and built a cellular eavesdropping device that's disguised as an old HP printer. Masquerading as a regular cellular service provider,...

Fake Fingerprint Stickers for Gloves
From Schneier on Security

Fake Fingerprint Stickers for Gloves

There's a Kickstarter for a sticker that you can stick on a glove and then register with a biometric access system like an iPhone. It's an interesting security...

Friday Squid Blogging: 3D-Printed Underwater Autonomous "Squid"
From Schneier on Security

Friday Squid Blogging: 3D-Printed Underwater Autonomous "Squid"

Pretty neat. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account