acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Mollitiam Industries is the Newest Cyberweapons Arms Manufacturer
From Schneier on Security

Mollitiam Industries is the Newest Cyberweapons Arms Manufacturer

Wired is reporting on a company called Mollitiam Industries: Marketing materials left exposed online by a third-party claim Mollitiam’s interception products, dubbed...

Apple Will Offer Onion Routing for iCloud/Safari Users
From Schneier on Security

Apple Will Offer Onion Routing for iCloud/Safari Users

At this year’s Apple Worldwide Developer Conference, Apple announced something called “iCloud Private Relay.” That’s basically its private version of onion routing...

Friday Squid Blogging: Squid-Related Game
From Schneier on Security

Friday Squid Blogging: Squid-Related Game

It’s called “Squid Fishering.” As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting...

The Future of Machine Learning and Cybersecurity
From Schneier on Security

The Future of Machine Learning and Cybersecurity

The Center for Security and Emerging Technology has a new report: “Machine Learning and Cybersecurity: Hype and Reality.” Here’s the bottom line: The report offers...

Peloton Vulnerability Found and Fixed
From Schneier on Security

Peloton Vulnerability Found and Fixed

Researchers have discovered a vulnerability in Peloton stationary bicycles, one that would give the attacker complete control over the device. The attack requires...

Intentional Flaw in GPRS Encryption Algorithm GEA-1
From Schneier on Security

Intentional Flaw in GPRS Encryption Algorithm GEA-1

General Packet Radio Service (GPRS) is a mobile data standard that was widely used in the early 2000s. The first encryption algorithm for that standard was GEA-1...

Paul van Oorschot’s Computer Security and the Internet
From Schneier on Security

Paul van Oorschot’s Computer Security and the Internet

Paul van Oorschot’s webpage contains a complete copy of his book: Computer Security and the Internet: Tools and Jewels. It’s worth reading.

VPNs and Trust
From Schneier on Security

VPNs and Trust

TorrentFreak surveyed nineteen VPN providers, asking them questions about their privacy practices: what data they keep, how they respond to court order, what country...

Andrew Appel on New Hampshire’s Election Audit
From Schneier on Security

Andrew Appel on New Hampshire’s Election Audit

Really interesting two part analysis of the audit conducted after the 2020 election in Windham, New Hampshire. Based on preliminary reports published by the team...

TikTok Can Now Collect Biometric Data
From Schneier on Security

TikTok Can Now Collect Biometric Data

This is probably worth paying attention to: A change to TikTok’s U.S. privacy policy on Wednesday introduced a new section that says the social video app “may collect...

FBI/AFP-Run Encrypted Phone
From Schneier on Security

FBI/AFP-Run Encrypted Phone

For three years, the Federal Bureau of Investigation and the Australian Federal Police owned and operated a commercial encrypted phone app, called AN0M, that was...

Detecting Deepfake Picture Editing
From Schneier on Security

Detecting Deepfake Picture Editing

“Markpainting” is a clever technique to watermark photos in such a way that makes it easier to detect ML-based manipulation: An image owner can modify their image...

Information Flows and Democracy
From Schneier on Security

Information Flows and Democracy

Henry Farrell and I published a paper on fixing American democracy: “Rechanneling Beliefs: How Information Flows Hinder or Help Democracy.” It’s much easier for...

Friday Squid Blogging: Colossal Squid Photographed off the Coast of Antarctica
From Schneier on Security

Friday Squid Blogging: Colossal Squid Photographed off the Coast of Antarctica

Wow. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here.

Vulnerabilities in Weapons Systems
From Schneier on Security

Vulnerabilities in Weapons Systems

“If you think any of these systems are going to work as expected in wartime, you’re fooling yourself.” That was Bruce’s response at a conference hosted by U.S....

Friday Squid Blogging: Squids in Space
From Schneier on Security

Friday Squid Blogging: Squids in Space

NASA is sending baby bobtail squid into space. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered....

The Supreme Court Narrowed the CFAA
From Schneier on Security

The Supreme Court Narrowed the CFAA

In a 6-3 ruling, the Supreme Court just narrowed the scope of the Computer Fraud and Abuse Act: In a ruling delivered today, the court sided with Van Buren and...

Friday Squid Blogging: Video of Giant Squid Hunting Prey
From Schneier on Security

Friday Squid Blogging: Video of Giant Squid Hunting Prey

Fantastic video of a giant squid hunting at depths between 1,827 and 3,117 feet. This is a follow-on from this post. As usual, you can also use this squid posthere...

Security and Human Behavior (SHB) 2021
From Schneier on Security

Security and Human Behavior (SHB) 2021

Today is the second day of the fourteenth Workshop on Security and Human Behavior. The University of Cambridge is the host, but we’re all on Zoom. SHB is a small...

Upcoming Speaking Engagements
From Schneier on Security

Upcoming Speaking Engagements

This is a current list of where and when I am scheduled to speak: I’ll be part of a European Internet Forum virtual debate on June 17, 2021. The topic is “Decrypting...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account