acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Hacking Trucks
From Schneier on Security

Hacking Trucks

Another hijack attack against vehicles, this time trucks and buses....

Frequent Password Changes is a Bad Security Idea
From Schneier on Security

Frequent Password Changes is a Bad Security Idea

I've been saying for years that it's bad security advice, that it encourages poor passwords. Lorrie Cranor, now the FTC's chief technologist, agrees: By studying...

More on the Vulnerabilities Equities Process
From Schneier on Security

More on the Vulnerabilities Equities Process

The Open Technology Institute of the New America Foundation has released a policy paper on the vulnerabilities equities process: "Bugs in the System: A Primer on...

NIST is No Longer Recommending Two-Factor Authentication Using SMS
From Schneier on Security

NIST is No Longer Recommending Two-Factor Authentication Using SMS

NIST is no longer recommending two-factor authentication systems that use SMS, because of their many insecurities. In the latest draft of its Digital Authentication...

New Presidential Directive on Incident Response
From Schneier on Security

New Presidential Directive on Incident Response

Last week, President Obama issued a policy directive (PPD-41) on cyber-incident response coordination. The FBI is in charge, which is no surprise. Actually, there's...

Security Vulnerabilities in Wireless Keyboards
From Schneier on Security

Security Vulnerabilities in Wireless Keyboards

Most of them are unencrypted, which makes them vulnerable to all sorts of attacks: On Tuesday Bastille's research team revealed a new set of wireless keyboard attacks...

Hacking the Vote
From Schneier on Security

Hacking the Vote

Russia has attacked the U.S. in cyberspace in an attempt to influence our national election, many experts have concluded. We need to take this national security...

Friday Squid Blogging: Glow-in-the-Dark Finger Tentacles
From Schneier on Security

Friday Squid Blogging: Glow-in-the-Dark Finger Tentacles

Archie McPhee sells glow-in-the-dark finger tentacles. As usual, you can also use this squid post to talk about the security stories in the news that I haven't...

How Altruism Might Have Evolved
From Schneier on Security

How Altruism Might Have Evolved

I spend a lot of time in my book Liars and Outliers on cooperating versus defecting. Cooperating is good for the group at the expense of the individual. Defecting...

The Security of Our Election Systems
From Schneier on Security

The Security of Our Election Systems

Russia was behind the hacks into the Democratic National Committee's computer network that led to the release of thousands of internal emails just before the party's...

Real-World Security and the Internet of Things
From Schneier on Security

Real-World Security and the Internet of Things

Disaster stories involving the Internet of Things are all the rage. They feature cars (both driven and driverless), the power grid, dams, and tunnel ventilation...

Detecting When a Smartphone Has Been Compromised
From Schneier on Security

Detecting When a Smartphone Has Been Compromised

Andrew "bunnie" Huang and Edward Snowden have designed a smartphone case that detects unauthorized transmissions by the phone. Paper. Three news articles. Looks...

The NSA and "Intelligence Legalism"
From Schneier on Security

The NSA and "Intelligence Legalism"

Interesting law journal paper: "Intelligence Legalism and the National Security Agency's Civil Liberties Gap," by Margo Schlanger: Abstract: This paper examines...

Russian Hack of the DNC
From Schneier on Security

Russian Hack of the DNC

Amazingly enough, the preponderance of the evidence points to Russia as the source of the DNC leak. I was going to summarize the evidence, but Thomas Rid did a...

Tracking the Owner of Kickass Torrents
From Schneier on Security

Tracking the Owner of Kickass Torrents

Here's the story of how it was done. First, a fake ad on torrent listings linked the site to a Latvian bank account, an e-mail address, and a Facebook page. Using...

Decoded, by Mai Jai
From Schneier on Security

Decoded, by Mai Jai

Has anyone read this book?...

The Economist on Hacking the Financial System
From Schneier on Security

The Economist on Hacking the Financial System

The Economist has an article on the potential hacking of the global financial system, both for profit or to cause mayhem. It's reasonably balanced. So how might...

Friday Squid Blogging: Sperm Whale Eats Squid
From Schneier on Security

Friday Squid Blogging: Sperm Whale Eats Squid

A post-mortem of a stranded sperm whale shows that he had recently eaten squid. As usual, you can also use this squid post to talk about the security stories in...

Cyber Weapons vs Nuclear Weapons
From Schneier on Security

Cyber Weapons vs Nuclear Weapons

Good essay pointing out the absurdity of comparing cyber weapons with nuclear weapons. On the surface, the analogy is compelling. Like nuclear weapons, the most...

DARPA Document: "On Countering Strategic Deception"
From Schneier on Security

DARPA Document: "On Countering Strategic Deception"

Old, but interesting. The document was published by DARPA in 1973, and approved for release in 2007. It examines the role of deception on strategic warning systems...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account