acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

The Importance of Protecting Cybersecurity Whistleblowers
From Schneier on Security

The Importance of Protecting Cybersecurity Whistleblowers

Interesting essay arguing that we need better legislation to protect cybersecurity whistleblowers. Congress should act to protect cybersecurity whistleblowers because...

The Human Cost of Cyberattacks
From Schneier on Security

The Human Cost of Cyberattacks

The International Committee of the Red Cross has just published a report: "The Potential Human Cost of Cyber-Operations." It's the result of an "ICRC Expert Meeting"...

Friday Squid Blogging: Hundred-Million-Year-Old Squid Relative Found in Amber
From Schneier on Security

Friday Squid Blogging: Hundred-Million-Year-Old Squid Relative Found in Amber

This is a really interesting find. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog...

Fraudulent Academic Papers
From Schneier on Security

Fraudulent Academic Papers

The term "fake news" has lost much of its meaning, but it describes a real and dangerous Internet trend. Because it's hard for many people to differentiate a real...

Alex Stamos on Content Moderation and Security
From Schneier on Security

Alex Stamos on Content Moderation and Security

Really interesting talk by former Facebook CISO Alex Stamos about the problems inherent in content moderation by social media platforms. Well worth watching....

First American Financial Corp. Data Records Leak
From Schneier on Security

First American Financial Corp. Data Records Leak

Krebs on Security is reporting a massive data leak by the real estate title insurance company First American Financial Corp. "The title insurance agency collects...

Friday Squid Blogging: More Materials Science from Squid Skin
From Schneier on Security

Friday Squid Blogging: More Materials Science from Squid Skin

Article: "How a Squid's Color-Changing Skin Inspired a New Material That Can Trap or Release Heat." As usual, you can also use this squid post to talk about the...

NSA Hawaii
From Schneier on Security

NSA Hawaii

Recently I've heard Edward Snowden talk about his working at the NSA in Hawaii as being "under a pineapple field." CBS News recently ran a segment on that NSA listening...

Germany Talking about Banning End-to-End Encryption
From Schneier on Security

Germany Talking about Banning End-to-End Encryption

Der Spiegel is reporting that the German Ministry for Internal Affairs is planning to require all Internet message services to provide plaintext messages on demand...

German SG-41 Encryption Machine Up for Auction
From Schneier on Security

German SG-41 Encryption Machine Up for Auction

A German auction house is selling an SG-41. It looks beautiful. Starting price is 75,000 euros. My guess is that it will sell for around 100K euros....

Thangrycat: A Serious Cisco Vulnerability
From Schneier on Security

Thangrycat: A Serious Cisco Vulnerability

Summary: Thangrycat is caused by a series of hardware design flaws within Cisco's Trust Anchor module. First commercially introduced in 2013, Cisco Trust Anchor...

Visiting the NSA
From Schneier on Security

Visiting the NSA

Yesterday, I visited the NSA. It was Cyber Command's birthday, but that's not why I was there. I visited as part of the Berklett Cybersecurity Project, run out...

Fingerprinting iPhones
From Schneier on Security

Fingerprinting iPhones

This clever attack allows someone to uniquely identify a phone when you visit a website, based on data from the accelerometer, gyroscope, and magnetometer sensors...

How Technology and Politics Are Changing Spycraft
From Schneier on Security

How Technology and Politics Are Changing Spycraft

Interesting article about how traditional nation-based spycraft is changing. Basically, the Internet makes it increasingly possible to generate a good cover story...

The Concept of "Return on Data"
From Schneier on Security

The Concept of "Return on Data"

This law review article by Noam Kolt, titled "Return on Data," proposes an interesting new way of thinking of privacy law. Abstract: Consumers routinely supply...

Friday Squid Blogging: On Squid Intelligence
From Schneier on Security

Friday Squid Blogging: On Squid Intelligence

Two links. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here...

Why Are Cryptographers Being Denied Entry into the US?
From Schneier on Security

Why Are Cryptographers Being Denied Entry into the US?

In March, Adi Shamir -- that's the "S" in RSA -- was denied a US visa to attend the RSA Conference. He's Israeli. This month, British citizen Ross Anderson couldn't...

More Attacks against Computer Automatic Update Systems
From Schneier on Security

More Attacks against Computer Automatic Update Systems

Last month, Kaspersky discovered that Asus's live update system was infected with malware, an operation it called Operation Shadowhammer. Now we learn that six...

Another Intel Chip Flaw
From Schneier on Security

Another Intel Chip Flaw

Remember the Spectre and Meltdown attacks from last year? They were a new class of attacks against complex CPUs, finding subliminal channels in optimization techniques...

WhatsApp Vulnerability Fixed
From Schneier on Security

WhatsApp Vulnerability Fixed

WhatsApp fixed a devastating vulnerability that allowed someone to remotely hack a phone by initiating a WhatsApp voice call. The recipient didn't even have to...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account