acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Falsifying Evidence on a Smart Phone
From Schneier on Security

Falsifying Evidence on a Smart Phone

Here's a way to plant false evidence -- call records, locations, etc -- on your smart phone. I have no idea how good this will be. Presumably it will be an arms...

Friday Squid Blogging: Antibiotic-Resistant Bacteria Found in Canadian Squid
From Schneier on Security

Friday Squid Blogging: Antibiotic-Resistant Bacteria Found in Canadian Squid

This is not good news. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

"Erotica Written By Someone With An Appropriate Sense of Privacy"
From Schneier on Security

"Erotica Written By Someone With An Appropriate Sense of Privacy"

Funny....

Seventh Movie-Plot Threat Contest Winner
From Schneier on Security

Seventh Movie-Plot Threat Contest Winner

On April 1, I announced the Seventh Mostly Annual Movie-Plot Threat Contest: The NSA has won, but how did it do it? How did it use its ability to conduct ubiquitous...

Censorship in China
From Schneier on Security

Censorship in China

First-person experience of censorship in China....

Feedly Victim of DDOS Blackmail
From Schneier on Security

Feedly Victim of DDOS Blackmail

So far they're resisting. Evernote and Deezer are also suffering attacks. I haven't seen anything linking the three different victims, and the other two have not...

iOS 8 is Randomizing MAC Addresses
From Schneier on Security

iOS 8 is Randomizing MAC Addresses

This seems like a good idea....

Security Risks from Remote Controlled Smart Devices
From Schneier on Security

Security Risks from Remote Controlled Smart Devices

We're starting to see a proliferation of smart devices that can be controlled from your phone. The security risk is, of course, that anyone can control them from...

Security and Human Behavior (SHB 2014)
From Schneier on Security

Security and Human Behavior (SHB 2014)

I'm at SHB 2014: the Seventh Annual Interdisciplinary Workshop on Security and Human Behavior. This is a small invitational gathering of people studying various...

Friday Squid Blogging: Squid Cartoon
From Schneier on Security

Friday Squid Blogging: Squid Cartoon

Rhymes with Orange. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

GCHQ Intercept Sites in Oman
From Schneier on Security

GCHQ Intercept Sites in Oman

Last June, the Guardian published a story about GCHQ tapping fiber-optic Internet cables around the globe, part of a program codenamed TEMPURA. One of the facts...

Edward Snowden Wins EPIC "Champion of Freedom" Award
From Schneier on Security

Edward Snowden Wins EPIC "Champion of Freedom" Award

On Monday I had the honor of presenting Edward Snowden with a "Champion of Freedom" award at the EPIC dinner. Snowden couldn't be there in person -- his father...

The Human Side of Heartbleed
From Schneier on Security

The Human Side of Heartbleed

The announcement on April 7 was alarming. A new Internet vulnerability called Heartbleed could allow hackers to steal your logins and passwords. It affected a piece...

Chinese Hacking of the US
From Schneier on Security

Chinese Hacking of the US

Chinese hacking of American computer networks is old news. For years we've known about their attacks against U.S. government and corporate targets. We've seen detailed...

Friday Squid Blogging: Squid-Shaped Pancakes
From Schneier on Security

Friday Squid Blogging: Squid-Shaped Pancakes

Here are pictures of squid-shaped pancakes. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Vulnerabilities Found in Law Enforcement Surveillance System
From Schneier on Security

Vulnerabilities Found in Law Enforcement Surveillance System

SEC Consult has published an advisory warning people not to use a government eavesdropping product called Recording eXpress, sold by the Israeli company Nice Systems...

TrueCrypt WTF
From Schneier on Security

TrueCrypt WTF

I have no idea what's going on with TrueCrypt. Good summary of story is a ArsTechnica, and SlashDot, Hacker News, and Reddit all have long comment threads. See...

Eben Moglen on Snowden and Surveillance
From Schneier on Security

Eben Moglen on Snowden and Surveillance

This is well worth reading. It's based on a series of talks he gave last fall....

The Economics of Bulk Surveillance
From Schneier on Security

The Economics of Bulk Surveillance

Ross Anderson has an important new paper on the economics that drive government-on-population bulk surveillance: My first big point is that all the three factors...

Friday Squid Blogging: Squid Ink Cocktail
From Schneier on Security

Friday Squid Blogging: Squid Ink Cocktail

Del Campo, a restaurant in Washington DC, has a Bloody Mary made with squid ink. As usual, you can also use this squid post to talk about the security stories in...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account