acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Detecting Spoofed Messages Using Clock Skew
From Schneier on Security

Detecting Spoofed Messages Using Clock Skew

Two researchers are working on a system to detect spoofed messages sent to automobiles by fingerprinting the clock skew of the various computer components within...

Stealing Money from ISPs Through Premium Rate Calls
From Schneier on Security

Stealing Money from ISPs Through Premium Rate Calls

I think the best hacks are the ones that are obvious once they're explained, but no one has thought of them before. Here's an example: Instagram ($2000), Google...

Futuristic Cyberattack Scenario
From Schneier on Security

Futuristic Cyberattack Scenario

This is a piece of near-future fiction about a cyberattack on New York, including hacking of cars, the water system, hospitals, elevators, and the power grid. Although...

Friday Squid Blogging: Stuffed Squid with Chard and Potatoes
From Schneier on Security

Friday Squid Blogging: Stuffed Squid with Chard and Potatoes

Looks like a tasty recipe. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

I Have Joined the Board of Directors of the Tor Project
From Schneier on Security

I Have Joined the Board of Directors of the Tor Project

This week, I have joined the board of directors of the Tor Project. Slashdot thread. Hacker News thread....

Security Effectiveness of the Israeli West Bank Barrier
From Schneier on Security

Security Effectiveness of the Israeli West Bank Barrier

Interesting analysis: Abstract: Objectives -- Informed by situational crime prevention (SCP) this study evaluates the effectiveness of the "West Bank Barrier" that...

Visiting a Website against the Owner's Wishes Is Now a Federal Crime
From Schneier on Security

Visiting a Website against the Owner's Wishes Is Now a Federal Crime

While we're on the subject of terrible 9th Circuit Court rulings: The U.S. Court of Appeals for the 9th Circuit has handed down a very important decision on the...

Password Sharing Is Now a Crime
From Schneier on Security

Password Sharing Is Now a Crime

In a truly terrible ruling, the US 9th Circuit Court ruled that using someone else's password with their permission but without the permission of the site owner...

Google's Post-Quantum Cryptography
From Schneier on Security

Google's Post-Quantum Cryptography

News has been bubbling about an announcement by Google that it's starting to experiment with public-key cryptography that's resistant to cryptanalysis by a quantum...

Report on the Vulnerabilities Equities Process
From Schneier on Security

Report on the Vulnerabilities Equities Process

I have written before on the vulnerabilities equities process (VEP): the system by which the US government decides whether to disclose and fix a computer vulnerability...

Anonymization and the Law
From Schneier on Security

Anonymization and the Law

Interesting paper: "Anonymization and Risk," by Ira S. Rubinstein and Woodrow Hartzog: Abstract: Perfect anonymization of data sets has failed. But the process...

Dallas Police Use a Robot to Kill a Person
From Schneier on Security

Dallas Police Use a Robot to Kill a Person

This seems to be a first....

Friday Squid Blogging: How Squids See Color Despite Black-and-White Vision
From Schneier on Security

Friday Squid Blogging: How Squids See Color Despite Black-and-White Vision

It's chromatic aberration. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

I'm on an "Adam Ruins Everything" Podcast
From Schneier on Security

I'm on an "Adam Ruins Everything" Podcast

Adam Conover interviewed me on his podcast. If you remember, I was featured on his "Adam Ruins Everything" TV episode on security....

Researchers Discover Tor Nodes Designed to Spy on Hidden Services
From Schneier on Security

Researchers Discover Tor Nodes Designed to Spy on Hidden Services

Two researchers have discovered over 100 Tor nodes that are spying on hidden services. Cory Doctorow explains: These nodes -- ordinary nodes, not exit nodes --...

Hijacking Someone's Facebook Account with a Fake Passport Copy
From Schneier on Security

Hijacking Someone's Facebook Account with a Fake Passport Copy

BBC has the story. The confusion is that a scan of a passport is much easier to forge than an actual passport. This is a truly hard problem: how do you give people...

The Difficulty of Routing around Internet Surveillance States
From Schneier on Security

The Difficulty of Routing around Internet Surveillance States

Interesting research: "Characterizing and Avoiding Routing Detours Through Surveillance States," by Anne Edmundson, Roya Ensafi, Nick Feamster, and Jennifer Rexford...

Good Article on Airport Security
From Schneier on Security

Good Article on Airport Security

The New York Times wrote a good piece comparing airport security around the world, and pointing out that moving the security perimeter doesn't make any difference...

Intellectual Property as National Security
From Schneier on Security

Intellectual Property as National Security

Interesting research: Debora Halbert, "Intellectual property theft and national security: Agendas and assumptions": Abstract: About a decade ago, intellectual property...

"Dogs Raise Fireworks Threat Level to 'Gray'"
From Schneier on Security

"Dogs Raise Fireworks Threat Level to 'Gray'"

Funny: The Department of Canine Security urges dogs to remain on high alert and employ the tactic of See Something, Say Something. Remember to bark upon spotting...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account