acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Analyzing IoT Security Best Practices
From Schneier on Security

Analyzing IoT Security Best Practices

New research: "Best Practices for IoT Security: What Does That Even Mean?" by Christopher Bellman and Paul C. van Oorschot: Abstract: Best practices for Internet...

COVID-19 Risks of Flying
From Schneier on Security

COVID-19 Risks of Flying

I fly a lot. Over the past five years, my average speed has been 32 miles an hour. That all changed mid-March. It's been 105 days since I've been on an airplane...

Cryptocurrency Pump and Dump Scams
From Schneier on Security

Cryptocurrency Pump and Dump Scams

Really interesting research: "An examination of the cryptocurrency pump and dump ecosystem": Abstract: The surge of interest in cryptocurrencies has been accompanied...

Nation-State Espionage Campaigns against Middle East Defense Contractors
From Schneier on Security

Nation-State Espionage Campaigns against Middle East Defense Contractors

Report on espionage attacks using LinkedIn as a vector for malware, with details and screenshots. They talk about "several hints suggesting a possible link" to...

Identifying a Person Based on a Photo, LinkedIn and Etsy Profiles, and Other Internet Bread Crumbs
From Schneier on Security

Identifying a Person Based on a Photo, LinkedIn and Etsy Profiles, and Other Internet Bread Crumbs

Interesting story of how the police can identify someone by following the evidence chain from website to website. According to filings in Blumenthal's case, FBI...

Friday Squid Blogging: Giant Squid Washes Up on South African Beach
From Schneier on Security

Friday Squid Blogging: Giant Squid Washes Up on South African Beach

Fourteen feet long and 450 pounds. It was dead before it washed up. As usual, you can also use this squid post to talk about the security stories in the news that...

Security and Human Behavior (SHB) 2020
From Schneier on Security

Security and Human Behavior (SHB) 2020

Today is the second day of the thirteenth Workshop on Security and Human Behavior. It's being hosted by the University of Cambridge, which in today's world means...

New Hacking-for-Hire Company in India
From Schneier on Security

New Hacking-for-Hire Company in India

Citizen Lab has a new report on Dark Basin, a large hacking-for-hire company in India. Key Findings: Dark Basin is a hack-for-hire group that has targeted thousands...

Theft of CIA's "Vault Seven" Hacking Tools Due to Its Own Lousy Security
From Schneier on Security

Theft of CIA's "Vault Seven" Hacking Tools Due to Its Own Lousy Security

The Washington Post is reporting on an internal CIA report about its "Vault 7" security breach: The breach -- allegedly committed by a CIA employee -- was discovered...

Zoom Will Be End-to-End Encrypted for All Users
From Schneier on Security

Zoom Will Be End-to-End Encrypted for All Users

Zoom is doing the right thing: it's making end-to-end encryption available to all users, paid and unpaid. (This is a change; I wrote about the initial decision...

Bank Card "Master Key" Stolen
From Schneier on Security

Bank Card "Master Key" Stolen

South Africa's Postbank experienced a catastrophic security failure. The bank's master PIN key was stolen, forcing it to cancel and replace 12 million bank cards...

Eavesdropping on Sound Using Variations in Light Bulbs
From Schneier on Security

Eavesdropping on Sound Using Variations in Light Bulbs

New research is able to recover sound waves in a room by observing minute changes in the room's light bulbs. This technique works from a distance, even from a building...

Examining the US Cyber Budget
From Schneier on Security

Examining the US Cyber Budget

Jason Healey takes a detailed look at the US federal cybersecurity budget and reaches an important conclusion: the US keeps saying that we need to prioritize defense...

Friday Squid Blogging: Human Cells with Squid-Like Transparency
From Schneier on Security

Friday Squid Blogging: Human Cells with Squid-Like Transparency

I think we need more human organs with squid-like features. As usual, you can also use this squid post to talk about the security stories in the news that I haven't...

Facebook Helped Develop a Tails Exploit
From Schneier on Security

Facebook Helped Develop a Tails Exploit

This is a weird story: Hernandez was able to evade capture for so long because he used Tails, a version of Linux designed for users at high risk of surveillance...

Another Intel Speculative Execution Vulnerability
From Schneier on Security

Another Intel Speculative Execution Vulnerability

Remember Spectre and Meltdown? Back in early 2018, I wrote: Spectre and Meltdown are pretty catastrophic vulnerabilities, but they only affect the confidentiality...

Availability Attacks against Neural Networks
From Schneier on Security

Availability Attacks against Neural Networks

New research on using specially crafted inputs to slow down machine-learning neural network systems: Sponge Examples: Energy-Latency Attacks on Neural Networks...

Security Analysis of the Democracy Live Online Voting System
From Schneier on Security

Security Analysis of the Democracy Live Online Voting System

New research: "Security Analysis of the Democracy Live Online Voting System": Abstract: Democracy Live's OmniBallot platform is a web-based system for blank ballot...

Gene Spafford on Internet Voting
From Schneier on Security

Gene Spafford on Internet Voting

Good interview....

Phishing Attacks Against Trump and Biden Campaigns
From Schneier on Security

Phishing Attacks Against Trump and Biden Campaigns

Google's threat analysts have identified state-level attacks from China. I hope both campaigns are working under the assumption that everything they say and do...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account