acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

More on the NSA's Capabilities
From Schneier on Security

More on the NSA's Capabilities

Ross Anderson summarizes a meeting in Princeton where Edward Snowden was "present." Third, the leaks give us a clear view of an intelligence analyst's workflow....

Friday Squid Blogging: Squid Chair
From Schneier on Security

Friday Squid Blogging: Squid Chair

Squid chair. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Cybersecurity Summer Camps
From Schneier on Security

Cybersecurity Summer Camps

For high-school kids....

Stealing a Billion
From Schneier on Security

Stealing a Billion

It helps if you own the banks: The report said Shor and his associates worked together in 2012 to buy a controlling stake in three Moldovan banks and then gradually...

Online Dating Scams
From Schneier on Security

Online Dating Scams

Interesting research: We identified three types of scams happening on Jiayuan. The first one involves advertising of escort services or illicit goods, and is very...

Another Example of Cell Phone Metadata Forensic Surveillance
From Schneier on Security

Another Example of Cell Phone Metadata Forensic Surveillance

Matthew Cole explains how the Italian police figured out how the CIA kidnapped Abu Omar in Milan. Interesting use of cell phone metadata, showing how valuable it...

An Example of Cell Phone Metadata Forensic Surveillance
From Schneier on Security

An Example of Cell Phone Metadata Forensic Surveillance

In this long article on the 2005 assassination of Rafik Hariri in Beirut, there's a detailed section on what the investigators were able to learn from the cell...

The NSA's Voice-to-Text Capabilities
From Schneier on Security

The NSA's Voice-to-Text Capabilities

New article from the Intercept based on the Snowden documents....

Easily Cracking a Master Combination Lock
From Schneier on Security

Easily Cracking a Master Combination Lock

Impressive. Kamkar told Ars his Master Lock exploit started with a well-known vulnerability that allows Master Lock combinations to be cracked in 100 or fewer tries...

Detecting QUANTUMINSERT
From Schneier on Security

Detecting QUANTUMINSERT

Fox-IT has a blog post (and has published Snort rules) on how to detect man-on-the-side Internet attacks like the NSA's QUANTUMINSERT. From a Wired article: But...

Friday Squid Blogging: Ceramic Squid Planters
From Schneier on Security

Friday Squid Blogging: Ceramic Squid Planters

Nice....

Digital Privacy Public Service Announcement
From Schneier on Security

Digital Privacy Public Service Announcement

I thought this was very well done....

Ears as a Biometric
From Schneier on Security

Ears as a Biometric

It's an obvious biometric for cell phones: Bodyprint recognizes users by their ears with 99.8% precision with a false rejection rate of only 1 out of 13. Grip,...

Measuring the Expertise of Burglars
From Schneier on Security

Measuring the Expertise of Burglars

New research paper: "New methods for examining expertise in burglars in natural and simulated environments: preliminary findings": Expertise literature in mainstream...

Protecting Against Google Phishing in Chrome
From Schneier on Security

Protecting Against Google Phishing in Chrome

Google has a new Chrome extension called "Password Alert": To help keep your account safe, today we're launching Password Alert, a free, open-source Chrome extension...

Remote Proctoring and Surveillance
From Schneier on Security

Remote Proctoring and Surveillance

Interesting article. There are a lot of surveillance and privacy issues at play here....

Shaking Someone Down for His Password
From Schneier on Security

Shaking Someone Down for His Password

A drug dealer claims that the police leaned him over an 18th floor balcony and threatened to kill him if he didn't give up his password. One of the policemen involved...

Nice Essay on Security Snake Oil
From Schneier on Security

Nice Essay on Security Snake Oil

This is good: Just as "data" is being sold as "intelligence", a lot of security technologies are being sold as "security solutions" rather than what they for the...

The History of Lockpicking
From Schneier on Security

The History of Lockpicking

Interesting....

The Further Democratization of Stingray
From Schneier on Security

The Further Democratization of Stingray

Stingray is the code name for an IMSI-catcher, which is basically a fake cell phone tower sold by Harris Corporation to various law enforcement agencies. (It's...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account