acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

REvil is Off-Line
From Schneier on Security

REvil is Off-Line

This is an interesting development: Just days after President Biden demanded that President Vladimir V. Putin of Russia shut down ransomware groups attacking American...

Upcoming Speaking Engagements
From Schneier on Security

Upcoming Speaking Engagements

This is a current list of where and when I am scheduled to speak: I’m speaking at Norbert Wiener in the 21st Century, a virtual conference hosted by The IEEE Society...

Colorado Passes Consumer Privacy Law
From Schneier on Security

Colorado Passes Consumer Privacy Law

First California. Then Virginia. Now Colorado. Here’s a good comparison of the three states’ laws.

China Taking Control of Zero-Day Exploits
From Schneier on Security

China Taking Control of Zero-Day Exploits

China is making sure that all newly discovered zero-day exploits are disclosed to the government. Under the new rules, anyone in China who finds a vulnerability...

Iranian State-Sponsored Hacking Attempts
From Schneier on Security

Iranian State-Sponsored Hacking Attempts

Interesting attack: Masquerading as UK scholars with the University of London’s School of Oriental and African Studies (SOAS), the threat actor TA453 has been covertly...

Friday Squid Blogging: The Evolution of Squid
From Schneier on Security

Friday Squid Blogging: The Evolution of Squid

Good video about the evolutionary history of squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered...

Analysis of the FBI’s Anom Phone
From Schneier on Security

Analysis of the FBI’s Anom Phone

Motherboard got its hands on one of those Anom phones that were really FBI honeypots. The details are interesting.

Details of the REvil Ransomware Attack
From Schneier on Security

Details of the REvil Ransomware Attack

ArsTechnica has a good story on the REvil ransomware attack of last weekend, with technical details: This weekend’s attack was carried out with almost surgical...

Vulnerability in the Kaspersky Password Manager
From Schneier on Security

Vulnerability in the Kaspersky Password Manager

A vulnerability (just patched) in the random number generator used in the Kaspersky Password Manager resulted in easily guessable passwords: The password generator...

Stealing Xbox Codes
From Schneier on Security

Stealing Xbox Codes

Detailed story of Volodymyr Kvashuk, a Microsoft insider who noticed a bug in the company’s internal systems that allowed him to create unlimited Xbox gift cards...

More Russian Hacking
From Schneier on Security

More Russian Hacking

Two reports this week. The first is from Microsoft, which wrote: As part of our investigation into this ongoing activity, we also detected information-stealingwrote...

Insurance and Ransomware
From Schneier on Security

Insurance and Ransomware

As ransomware becomes more common, I’m seeing more discussions about the ethics of paying the ransom. Here’s one more contribution to that issue: a research paper...

Risks of Evidentiary Software
From Schneier on Security

Risks of Evidentiary Software

Over at Lawfare, Susan Landau has an excellent essay on the risks posed by software used to collect evidence (a Breathalyzer is probably the most obvious example)...

Friday Squid Blogging: Giant Squid Model
From Schneier on Security

Friday Squid Blogging: Giant Squid Model

Pretty wooden model. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines...

Friday Squid Blogging: Best Squid-Related Headline
From Schneier on Security

Friday Squid Blogging: Best Squid-Related Headline

From the New York Times: “When an Eel Climbs a Ramp to Eat Squid From a Clamp, That’s a Moray.” The article is about the eel; the squid is just eel food. But still...

NFC Flaws in POS Devices and ATMs
From Schneier on Security

NFC Flaws in POS Devices and ATMs

It’s a series of vulnerabilities: Josep Rodriguez, a researcher and consultant at security firm IOActive, has spent the last year digging up and reporting vulnerabilities...

AI-Piloted Fighter Jets
From Schneier on Security

AI-Piloted Fighter Jets

News from Georgetown’s Center for Security and Emerging Technology: China Claims Its AI Can Beat Human Pilots in Battle: Chinese state media reported that an AI...

Banning Surveillance-Based Advertising
From Schneier on Security

Banning Surveillance-Based Advertising

The Norwegian Consumer Council just published a fantastic new report: “Time to Ban Surveillance-Based Advertising.” From the Introduction: The challenges caused...

Mollitiam Industries is the Newest Cyberweapons Arms Manufacturer
From Schneier on Security

Mollitiam Industries is the Newest Cyberweapons Arms Manufacturer

Wired is reporting on a company called Mollitiam Industries: Marketing materials left exposed online by a third-party claim Mollitiam’s interception products, dubbed...

Apple Will Offer Onion Routing for iCloud/Safari Users
From Schneier on Security

Apple Will Offer Onion Routing for iCloud/Safari Users

At this year’s Apple Worldwide Developer Conference, Apple announced something called “iCloud Private Relay.” That’s basically its private version of onion routing...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account