acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Upcoming Speaking Engagements
From Schneier on Security

Upcoming Speaking Engagements

This is a current list of where and when I am scheduled to speak: I’m speaking (via Internet) at SHIFT Business Festival in Finland, August 25-26, 2021. I’ll be...

Cobolt Strike Vulnerability Affects Botnet Servers
From Schneier on Security

Cobolt Strike Vulnerability Affects Botnet Servers

Cobolt Strike is a security tool, used by penetration testers to simulate network attackers. But it’s also used by attackers — from criminals to governments — to...

Apple Adds a Backdoor to iMesssage and iCloud Storage
From Schneier on Security

Apple Adds a Backdoor to iMesssage and iCloud Storage

Apple’s announcement that it’s going to start scanning photos for child abuse material is a big deal. I have been following the details, and discussing it in several...

Defeating Microsoft’s Trusted Platform Module
From Schneier on Security

Defeating Microsoft’s Trusted Platform Module

This is a really interesting story explaining how to defeat Microsoft’s TPM in 30 minutes — without having to solder anything to the motherboard. Researchers at...

Squid Dog Toy
From Schneier on Security

Squid Dog Toy

It’s sold out, but the pictures are cute. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read...

Using “Master Faces” to Bypass Face-Recognition Authenticating Systems
From Schneier on Security

Using “Master Faces” to Bypass Face-Recognition Authenticating Systems

Fascinating research: “Generating Master Faces for Dictionary Attacks with a Network-Assisted Latent Space Evolution.” Abstract: A master face is a face image that...

Zoom Lied about End-to-End Encryption
From Schneier on Security

Zoom Lied about End-to-End Encryption

The facts aren’t news, but Zoom will pay $85M — to the class-action attorneys, and to users — for lying to users about end-to-end encryption, and for giving user...

Paragon: Yet Another Cyberweapons Arms Manufacturer
From Schneier on Security

Paragon: Yet Another Cyberweapons Arms Manufacturer

Forbes has the story: Paragon’s product will also likely get spyware critics and surveillance experts alike rubbernecking: It claims to give police the power to...

The European Space Agency Launches Hackable Satellite
From Schneier on Security

The European Space Agency Launches Hackable Satellite

Of course this is hackable: A sophisticated telecommunications satellite that can be completely repurposed while in space has launched. […] Because the satellite...

Storing Encrypted Photos in Google’s Cloud
From Schneier on Security

Storing Encrypted Photos in Google’s Cloud

New paper: “Encrypted Cloud Photo Storage Using Google Photos“: Abstract: Cloud photo services are widely used for persistent, convenient, and often free photo...

I Am Parting With My Crypto Library
From Schneier on Security

I Am Parting With My Crypto Library

The time has come for me to find a new home for my (paper) cryptography library. It’s about 150 linear feet of books, conference proceedings, journals, and monographs...

Friday Squid Blogging: Squid Skin Is Naturally Anti-microbial
From Schneier on Security

Friday Squid Blogging: Squid Skin Is Naturally Anti-microbial

Often it feels like squid just evolved better than us mammals. As usual, you can also use this squid post to talk about the security stories in the news that Ihere...

AirDropped Gun Photo Causes Terrorist Scare
From Schneier on Security

AirDropped Gun Photo Causes Terrorist Scare

A teenager on an airplane sent a photo of a replica gun via AirDrop to everyone who had their settings configured to receive unsolicited photos from strangers.these...

De-anonymization Story
From Schneier on Security

De-anonymization Story

This is important: Monsignor Jeffrey Burrill was general secretary of the US Conference of Catholic Bishops (USCCB), effectively the highest-ranking priest inreportedly...

Hiding Malware in ML Models
From Schneier on Security

Hiding Malware in ML Models

Interesting research: “EvilModel: Hiding Malware Inside of Neural Network Models”. Abstract: Delivering malware covertly and detection-evadingly is critical to...

Disrupting Ransomware by Disrupting Bitcoin
From Schneier on Security

Disrupting Ransomware by Disrupting Bitcoin

Ransomware isn’t new; the idea dates back to 1986 with the “Brain” computer virus. Now, it’s become the criminal business model of the internet for two reasons....

Commercial Location Data Used to Out Priest
From Schneier on Security

Commercial Location Data Used to Out Priest

A Catholic priest was outed through commercially available surveillance data. Vice has a good analysis: The news starkly demonstrates not only the inherent power...

Nasty Printer Driver Vulnerability
From Schneier on Security

Nasty Printer Driver Vulnerability

From SentinelLabs, a critical vulnerability in HP printer drivers: Researchers have released technical details on a high-severity privilege-escalation flaw in...

NSO Group Hacked
From Schneier on Security

NSO Group Hacked

NSO Group, the Israeli cyberweapons arms manufacturer behind the Pegasus spyware — used by authoritarian regimes around the world to spy on dissidents, journalists...

Candiru: Another Cyberweapons Arms Manufacturer
From Schneier on Security

Candiru: Another Cyberweapons Arms Manufacturer

Citizen Lab has identified yet another Israeli company that sells spyware to governments around the world: Candiru. From the report: Summary: Candiru is a secretive...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account