acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Backdoor Built into Android Firmware
From Schneier on Security

Backdoor Built into Android Firmware

In 2017, some Android phones came with a backdoor pre-installed: Criminals in 2017 managed to get an advanced backdoor preinstalled on Android devices before they...

Fake News and Pandemics
From Schneier on Security

Fake News and Pandemics

When the next pandemic strikes, we'll be fighting it on two fronts. The first is the one you immediately think about: understanding the disease, researching a cure...

How Apple's "Find My" Feature Works
From Schneier on Security

How Apple's "Find My" Feature Works

Matthew Green intelligently speculates about how Apple's new "Find My" feature works. If you haven't already been inspired by the description above, let me phrase...

Hacking Hardware Security Modules
From Schneier on Security

Hacking Hardware Security Modules

Security researchers Gabriel Campana and Jean-Baptiste Bédrune are giving a hardware security module (HSM) talk at BlackHat in August: This highly technical presentation...

Risks of Password Managers
From Schneier on Security

Risks of Password Managers

Stuart Schechter writes about the security risks of using a password manager. It's a good piece, and nicely discusses the trade-offs around password managers: which...

Maciej Cegłowski on Privacy in the Information Age
From Schneier on Security

Maciej Cegłowski on Privacy in the Information Age

Maciej Cegłowski has a really good essay explaining how to think about privacy today: For the purposes of this essay, I'll call it "ambient privacy" -- the understanding...

Data, Surveillance, and the AI Arms Race
From Schneier on Security

Data, Surveillance, and the AI Arms Race

According to foreign policy experts and the defense establishment, the United States is caught in an artificial intelligence arms race with China -- one with serious...

Friday Squid Blogging: Climate Change Could be Good for Squid
From Schneier on Security

Friday Squid Blogging: Climate Change Could be Good for Squid

Basically, they thrive in a high CO2 environment, because it doesn't bother them and makes their prey weaker. As usual, you can also use this squid post to talk...

Upcoming Speaking Engagements
From Schneier on Security

Upcoming Speaking Engagements

This is a current list of where and when I am scheduled to speak: I'm speaking on "Securing a World of Physically Capable Computers" at Oxford University on Monday...

Computers and Video Surveillance
From Schneier on Security

Computers and Video Surveillance

It used to be that surveillance cameras were passive. Maybe they just recorded, and no one looked at the video unless they needed to. Maybe a bored guard watched...

Video Surveillance by Computer
From Schneier on Security

Video Surveillance by Computer

The ACLU's Jay Stanley has just published a fantastic report: "The Dawn of Robot Surveillance" (blog post here) Basically, it lays out a future of ubiquitous video...

Report on the Stalkerware Industry
From Schneier on Security

Report on the Stalkerware Industry

Citizen Lab just published an excellent report on the stalkerware industry....

Rock-Paper-Scissors Robot
From Schneier on Security

Rock-Paper-Scissors Robot

How in the world did I not know about this for three years? Researchers at the University of Tokyo have developed a robot that always wins at rock-paper-scissors...

Workshop on the Economics of Information Security
From Schneier on Security

Workshop on the Economics of Information Security

Last week, I hosted the eighteenth Workshop on the Economics of Information Security at Harvard. Ross Anderson liveblogged the talks....

Employment Scam
From Schneier on Security

Employment Scam

Interesting story of an old-school remote-deposit capture fraud scam, wrapped up in a fake employment scam. Slashdot thread....

Friday Squid Blogging: Possible New Squid Species
From Schneier on Security

Friday Squid Blogging: Possible New Squid Species

NOAA video. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here...

iOS Shortcut for Recording the Police
From Schneier on Security

iOS Shortcut for Recording the Police

"Hey Siri; I'm getting pulled over" can be a shortcut: Once the shortcut is installed and configured, you just have to say, for example, "Hey Siri, I'm getting...

Security and Human Behavior (SHB) 2019
From Schneier on Security

Security and Human Behavior (SHB) 2019

Today is the second day of the twelfth Workshop on Security and Human Behavior, which I am hosting at Harvard University. SHB is a small, annual, invitational workshop...

Chinese Military Wants to Develop Custom OS
From Schneier on Security

Chinese Military Wants to Develop Custom OS

Citing security concerns, the Chinese military wants to replace Windows with its own custom operating system: Thanks to the Snowden, Shadow Brokers, and Vault7...

Lessons Learned Trying to Secure Congressional Campaigns
From Schneier on Security

Lessons Learned Trying to Secure Congressional Campaigns

Really interesting first-hand experience from Maciej Cegłowski....
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account