acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Security of Health Information
From Schneier on Security

Security of Health Information

The world is racing to contain the new COVID-19 virus that is spreading around the globe with alarming speed. Right now, pandemic disease experts at the World Health...

Let's Encrypt Vulnerability
From Schneier on Security

Let's Encrypt Vulnerability

The BBC is reporting a vulnerability in the Let's Encrypt certificate service: In a notification email to its clients, the organisation said: "We recently discovered...

Wi-Fi Chip Vulnerability
From Schneier on Security

Wi-Fi Chip Vulnerability

There's a vulnerability in Wi-Fi hardware that breaks the encryption: The vulnerability exists in Wi-Fi chips made by Cypress Semiconductor and Broadcom, the latter...

Facebook's Download-Your-Data Tool Is Incomplete
From Schneier on Security

Facebook's Download-Your-Data Tool Is Incomplete

Privacy International has the details: Key facts: Despite Facebook claim, "Download Your Information" doesn't provide users with a list of all advertisers who uploaded...

Friday Squid Blogging: Squid Eggs
From Schneier on Security

Friday Squid Blogging: Squid Eggs

Cool photo. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here...

Humble Bundle's 2020 Cybersecurity Books
From Schneier on Security

Humble Bundle's 2020 Cybersecurity Books

For years, Humble Bundle has been selling great books at a "pay what you can afford" model. This month, they're featuring as many as nineteen cybersecurity books...

Deep Learning to Find Malicious Email Attachments
From Schneier on Security

Deep Learning to Find Malicious Email Attachments

Google presented its system of using deep-learning techniques to identify malicious email attachments: At the RSA security conference in San Francisco on Tuesday...

Securing the Internet of Things through Class-Action Lawsuits
From Schneier on Security

Securing the Internet of Things through Class-Action Lawsuits

This law journal article discusses the role of class-action litigation to secure the Internet of Things. Basically, the article postulates that (1) market realities...

Newly Declassified Study Demonstrates Uselessness of NSA's Phone Metadata Program
From Schneier on Security

Newly Declassified Study Demonstrates Uselessness of NSA's Phone Metadata Program

The New York Times is reporting on the NSA's phone metadata program, which the NSA shut down last year: A National Security Agency system that analyzed logs of...

Firefox Enables DNS over HTTPS
From Schneier on Security

Firefox Enables DNS over HTTPS

This is good news: Whenever you visit a website -- even if it's HTTPS enabled -- the DNS query that converts the web address into an IP address that computers can...

Russia Is Trying to Tap Transatlantic Cables
From Schneier on Security

Russia Is Trying to Tap Transatlantic Cables

The Times of London is reporting that Russian agents are in Ireland probing transatlantic communications cables. Ireland is the landing point for undersea cables...

Friday Squid Blogging: 13-foot Giant Squid Caught off New Zealand Coast
From Schneier on Security

Friday Squid Blogging: 13-foot Giant Squid Caught off New Zealand Coast

It's probably a juvenile: Researchers aboard the New Zealand-based National Institute of Water and Atmospheric Research Ltd (NIWA) research vessel Tangaroa were...

Inrupt, Tim Berners-Lee's Solid, and Me
From Schneier on Security

Inrupt, Tim Berners-Lee's Solid, and Me

For decades, I have been talking about the importance of individual privacy. For almost as long, I have been using the metaphor of digital feudalism to describe...

Policy vs Technology
From Schneier on Security

Policy vs Technology

Sometime around 1993 or 1994, during the first Crypto Wars, I was part of a group of cryptography experts that went to Washington to advocate for strong encryption...

Internet of Things Candle
From Schneier on Security

Internet of Things Candle

There's a Kickstarter for an actual candle, with real fire, that you can control over the Internet. What could possibly go wrong?...

Hacking McDonald's for Free Food
From Schneier on Security

Hacking McDonald's for Free Food

This hack was possible because the McDonald's app didn't authenticate the server, and just did whatever the server told it to do: McDonald's receipts in Germany...

Voatz Internet Voting App Is Insecure
From Schneier on Security

Voatz Internet Voting App Is Insecure

This paper describes the flaws in the Voatz Internet voting app: "The Ballot is Busted Before the Blockchain: A Security Analysis of Voatz, the First Internet Voting...

Friday Squid Blogging: Squids Are as Intelligent as Dogs
From Schneier on Security

Friday Squid Blogging: Squids Are as Intelligent as Dogs

More news based on the squid brain MRI scan: the complexity of their brains are comparable to dogs. As usual, you can also use this squid post to talk about the...

Upcoming Speaking Engagements
From Schneier on Security

Upcoming Speaking Engagements

This is a current list of where and when I am scheduled to speak: I'll be at RSA Conference 2020 in San Francisco. On Wednesday, February 26, at 2:50 PM, I'll be...

DNSSEC Keysigning Ceremony Postponed Because of Locked Safe
From Schneier on Security

DNSSEC Keysigning Ceremony Postponed Because of Locked Safe

Interesting collision of real-world and Internet security: The ceremony sees several trusted internet engineers (a minimum of three and up to seven) from across...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account