acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Infecting Systems by Typosquatting Programming Language Libraries
From Schneier on Security

Infecting Systems by Typosquatting Programming Language Libraries

Typosquatting is an old trick of registering a domain name a typo away from a popular domain name and using it for various nefarious purposes. Nikolai Philipp Tschacher...

Russians Hacking DNC Computers
From Schneier on Security

Russians Hacking DNC Computers

The Washington Post is reporting that Russian hackers penetrated the network of the Democratic National Committee and stole opposition research on Donald Trump....

NSA Using Insecure Word Macros
From Schneier on Security

NSA Using Insecure Word Macros

There's an interesting message in the documents about Snowden that Vice magazine got out of the NSA with a FOIA request. At least in 2012, the NSA was using Word...

Friday Squid Blogging: Beautiful Squid Sculpture
From Schneier on Security

Friday Squid Blogging: Beautiful Squid Sculpture

Two years ago, I posted a photograph of a beautiful giant bronze squid sculpture by Kirk McGuire. He has a new sculpture: a squid table base. it's also beautiful...

Financial Cyber Risk Is Not Systemic Risk
From Schneier on Security

Financial Cyber Risk Is Not Systemic Risk

This interesting essay argues that financial risks are generally not systemic risks, and instead are generally much smaller. That's certainly been our experience...

1944 CIA Sabotage Manual
From Schneier on Security

1944 CIA Sabotage Manual

It makes for interesting reading. Someone noticed that parts of it read like standard modern office procedures....

Wayz Data Poisoning
From Schneier on Security

Wayz Data Poisoning

People who don't want Wayz routing cars through their neighborhoods are feeding it false data. It was here that Connor learned that some Waze warriors had launched...

Inherent Bias in Recidivism Algorithm
From Schneier on Security

Inherent Bias in Recidivism Algorithm

Really good investigative reporting on the automatic algorithms used to predict recidivism rates....

Long Article on Snowden's Attempts to Raise His Concerns Inside the NSA
From Schneier on Security

Long Article on Snowden's Attempts to Raise His Concerns Inside the NSA

Lots of details that demonstrate that Snowden did try to raise his concerns internally before going public, and that the NSA lied about this....

Another Side-Channel Attack on PC Encryption
From Schneier on Security

Another Side-Channel Attack on PC Encryption

New paper: "Physical Key Extraction Attacks on PCs," by Daniel Genkin, Lev Pachmanov, Itamar Pipman, Adi Shamir, and Eran Tromer. They recover keys acoustically...

Hijacking the PC Update Process
From Schneier on Security

Hijacking the PC Update Process

There's a new report on security vulnerabilities in the PC initialization/update process, allowing someone to hijack it to install malware: One of the major things...

Friday Squid Blogging: Giant Mechanical Squid
From Schneier on Security

Friday Squid Blogging: Giant Mechanical Squid

It's beautiful, from the Maker Faire Bay Area 2016....

Security and Human Behavior (SHB 2016)
From Schneier on Security

Security and Human Behavior (SHB 2016)

Earlier this week, I was at the ninth Workshop on Security and Human Behavior, hosted at Harvard University. SHB is a small invitational gathering of people studying...

Stuxnet-Like Malware Discovered
From Schneier on Security

Stuxnet-Like Malware Discovered

There's a new piece of malware called Irongate, which is obviously inspired by Stuxnet. We don't know who is responsible for it. Slashdot thread....

Lockpicking Competitions in the 1950s
From Schneier on Security

Lockpicking Competitions in the 1950s

Interesting history....

Stealth Falcon: New Malware from (Probably) the UAE
From Schneier on Security

Stealth Falcon: New Malware from (Probably) the UAE

Citizen Lab has the details: This report describes a campaign of targeted spyware attacks carried out by a sophisticated operator, which we call Stealth Falcon....

The Fallibility of DNA Evidence
From Schneier on Security

The Fallibility of DNA Evidence

This is a good summary article on the fallibility of DNA evidence. Most interesting to me are the parts on the proprietary algorithms used in DNA matching: William...

Arresting People for Walking Away from Airport Security
From Schneier on Security

Arresting People for Walking Away from Airport Security

A proposed law in Albany, NY, would make it a crime to walk away from airport screening. Aside from wondering why county lawmakers are getting involved with what...

Identifying People from their Driving Patterns
From Schneier on Security

Identifying People from their Driving Patterns

People can be identified from their "driver fingerprint": ...a group of researchers from the University of Washington and the University of California at San Diego...

Friday Squid Blogging: More Squids
From Schneier on Security

Friday Squid Blogging: More Squids

This research paper shows that the number of squids, and the number of cephalopods in general, has been steadily increasing over the past 60 years: Our analyses...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account