acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Children of Spies
From Schneier on Security

Children of Spies

Fascinating story of Tim and Alex Foley, the children of Russian spies Donald Heathfield and Tracey Foley....

Economist Detained for Doing Math on an Airplane
From Schneier on Security

Economist Detained for Doing Math on an Airplane

An economics professor was detained when he was spotted doing math on an airplane: On Thursday evening, a 40-year-old man ­-- with dark, curly hair, olive skin...

NIST Starts Planning for Post-Quantum Cryptography
From Schneier on Security

NIST Starts Planning for Post-Quantum Cryptography

Last year, the NSA announced its plans for transitioning to cryptography that is resistant to a quantum computer. Now, it's NIST's turn. Its just-released report...

Friday Squid Blogging: Firefly Squid in the News
From Schneier on Security

Friday Squid Blogging: Firefly Squid in the News

It's a good time to see firefly squid in Japan. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered...

Dilbert on Electronic Voting Machines
From Schneier on Security

Dilbert on Electronic Voting Machines

Accurate (the cartoon, not the machines)....

White House Report on Big Data Discrimination
From Schneier on Security

White House Report on Big Data Discrimination

The White House has released a report on big-data discrimination. From the blog post: Using case studies on credit lending, employment, higher education, and criminal...

Own a Pair of Clipper Chips
From Schneier on Security

Own a Pair of Clipper Chips

The AT&T TSD was an early 1990s telephone encryption device. It was digital. Voice quality was okay. And it was the device that contained the infamous Clipper Chip...

$7 Million Social Media Privacy Mistake
From Schneier on Security

$7 Million Social Media Privacy Mistake

Forbes estimates that football player Laremy Tunsil lost $7 million in salary because of an ill-advised personal video made public....

Credential Stealing as an Attack Vector
From Schneier on Security

Credential Stealing as an Attack Vector

Traditional computer security concerns itself with vulnerabilities. We employ antivirus software to detect malware that exploits vulnerabilities. We have automatic...

Julian Sanchez on the Feinstein-Burr Bill
From Schneier on Security

Julian Sanchez on the Feinstein-Burr Bill

Two excellent posts....

Fake Security Conferences
From Schneier on Security

Fake Security Conferences

Turns out there are two different conferences with the title International Conference on Cyber Security (ICCS 2016), one real and one fake. Richard Clayton has...

Vulnerabilities in Samsung's SmartThings
From Schneier on Security

Vulnerabilities in Samsung's SmartThings

Interesting research: Earlence Fernandes, Jaeyeon Jung, and Atul Prakash, "Security Analysis of Emerging Smart Home Applications": Abstract: Recently, several competing...

Friday Squid Blogging: Global Squid Shortage
From Schneier on Security

Friday Squid Blogging: Global Squid Shortage

There's a squid shortage along the Pacific coast of the Americas. As usual, you can also use this squid post to talk about the security stories in the news that...

I'm Writing a Book on Security
From Schneier on Security

I'm Writing a Book on Security

I'm writing a book on security in the highly connected Internet-of-Things World. Tentative title: Click Here to Kill Everything Peril and Promise in a Hyper-connected...

Documenting the Chilling Effects of NSA Surveillance
From Schneier on Security

Documenting the Chilling Effects of NSA Surveillance

In Data and Golliath, I talk about the self-censorship that comes along with broad surveillance. This interesting research documents this phenomenon in Wikipedia...

Amazon Unlimited Fraud
From Schneier on Security

Amazon Unlimited Fraud

Amazon Unlimited is a all-you-can-read service. You pay one price and can read anything that's in the program. Amazon pays authors out of a fixed pool, on the basis...

Two Good Readings on the Encryption "Going Dark" Debate
From Schneier on Security

Two Good Readings on the Encryption "Going Dark" Debate

Testimonies of Matt Blaze and Danny Weitzner, both on April 19th before the House Energy and Commerce Committee. And the hearing....

People Trust Robots, Even When They Don't Inspire Trust
From Schneier on Security

People Trust Robots, Even When They Don't Inspire Trust

Interesting research: In the study, sponsored in part by the Air Force Office of Scientific Research (AFOSR), the researchers recruited a group of 42 volunteers...

Graffiti by Drone
From Schneier on Security

Graffiti by Drone

Drones can graffiti walls that no person can reach. (Note that wired.com blocks ad blockers. My trick is to copy the page and then paste it into my text editor.)...

BlackBerry's Global Encryption Key
From Schneier on Security

BlackBerry's Global Encryption Key

Last week there was a big news story about the Blackberry encryption. The news was that all BlackBerry devices share a global encryption key, and that the Canadian...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account