acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Hacking Automobile Keyless Entry Systems
From Schneier on Security

Hacking Automobile Keyless Entry Systems

Suspected members of a European car-theft ring have been arrested: The criminals targeted vehicles with keyless entry and start systems, exploiting the technology...

Friday Squid Blogging: On Squid Ink
From Schneier on Security

Friday Squid Blogging: On Squid Ink

It’s aimed at children, but it’s a good primer. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered...

Upcoming Speaking Engagements
From Schneier on Security

Upcoming Speaking Engagements

This is a current list of where and when I am scheduled to speak: I’m speaking at the World Ethical Data Forum, online, October 26-28, 2022. I’m speaking at the...

Regulating DAOs
From Schneier on Security

Regulating DAOs

In August, the US Treasury’s Office of Foreign Assets Control (OFAC) sanctioned the cryptocurrency platform Tornado Cash, a virtual currency “mixer” designed to...

Check What Information Your Browser Leaks
From Schneier on Security

Check What Information Your Browser Leaks

These two sites tell you what sorts of information you’re leaking from your browser.

Friday Squid Blogging: Person in Squid Suit Takes Dog for a Walk
From Schneier on Security

Friday Squid Blogging: Person in Squid Suit Takes Dog for a Walk

No, I don’t understand it, either. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog...

I Am Not Satoshi Nakamoto
From Schneier on Security

I Am Not Satoshi Nakamoto

This isn’t the first time I’ve received an e-mail like this: Hey! I’ve done my research and looked at a lot of facts and old forgotten archives. I know that you...

Tracking Stolen Cryptocurrencies
From Schneier on Security

Tracking Stolen Cryptocurrencies

Good article about the current state of cryptocurrency forensics.

The Proliferation of Zero-days
From Schneier on Security

The Proliferation of Zero-days

The MIT Technology Review is reporting that 2021 is a blockbuster year for zero-day exploits: One contributing factor in the higher rate of reported zero-days...

ROT8000
From Schneier on Security

ROT8000

ROT8000 is the Unicode equivalent of ROT13. What’s clever about it is that normal English looks like Chinese, and not like ciphertext (to a typical Westerner, that...

FBI Had the REvil Decryption Key
From Schneier on Security

FBI Had the REvil Decryption Key

The Washington Post reports that the FBI had a decryption key for the REvil ransomware, but didn’t pass it along to victims because it would have disrupted an ongoing...

Alaska’s Department of Health and Social Services Hack
From Schneier on Security

Alaska’s Department of Health and Social Services Hack

Apparently, a nation-state hacked Alaska’s Department of Health and Social Services. Not sure why Alaska’s Department of Health and Social Services is of any interest...

Friday Squid Blogging: Ram’s Horn Squid Shells
From Schneier on Security

Friday Squid Blogging: Ram’s Horn Squid Shells

You can find ram’s horn squid shells on beaches in Texas (and presumably elsewhere). As usual, you can also use this squid post to talk about the security stories...

Zero-Click iMessage Exploit
From Schneier on Security

Zero-Click iMessage Exploit

Citizen Lab released a report on a zero-click iMessage exploit that is used in NSO Group’s Pegasus spyware. Apple patched the vulnerability; everyone needs to update...

Identifying Computer-Generated Faces
From Schneier on Security

Identifying Computer-Generated Faces

It’s the eyes: The researchers note that in many cases, users can simply zoom in on the eyes of a person they suspect may not be real to spot the pupil irregularities...

Upcoming Speaking Engagements
From Schneier on Security

Upcoming Speaking Engagements

This is a current list of where and when I am scheduled to speak: I’m keynoting CIISec Live—an all-online event—September 15-16, 2021. I’m speaking at the Infosecurity...

Designing Contact-Tracing Apps
From Schneier on Security

Designing Contact-Tracing Apps

Susan Landau wrote an essay on the privacy, efficacy, and equity of contract-tracing smartphone apps. Also see her excellent book on the topic.

Friday Squid Blogging: Possible Evidence of Squid Paternal Care
From Schneier on Security

Friday Squid Blogging: Possible Evidence of Squid Paternal Care

Researchers have found possible evidence of paternal care among bigfin reef squid. As usual, you can also use this squid post to talk about the security stories...

ProtonMail Now Keeps IP Logs
From Schneier on Security

ProtonMail Now Keeps IP Logs

After being compelled by a Swiss court to monitor IP logs for a particular user, ProtonMail no longer claims that “we do not keep any IP logs.”

More Detail on the Juniper Hack and the NSA PRNG Backdoor
From Schneier on Security

More Detail on the Juniper Hack and the NSA PRNG Backdoor

We knew the basics of this story, but it’s good to have more detail. Here’s me in 2015 about this Juniper hack. Here’s me in 2007 on the NSA backdoor.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account