acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

GPS Spoofing Attacks
From Schneier on Security

GPS Spoofing Attacks

Wired has a story about a possible GPS spoofing attack by Russia: After trawling through AIS data from recent years, evidence of spoofing becomes clear. Goward...

Boston Red Sox Caught Using Technology to Steal Signs
From Schneier on Security

Boston Red Sox Caught Using Technology to Steal Signs

The Boston Red Sox admitted to eavesdropping on the communications channel between catcher and pitcher. Stealing signs is believed to be particularly effective...

ISO Rejects NSA Encryption Algorithms
From Schneier on Security

ISO Rejects NSA Encryption Algorithms

The ISO has decided not to approve two NSA-designed block encryption algorithms: Speck and Simon. It's because the NSA is not trusted to put security ahead of surveillance...

What the NSA Collects via 702
From Schneier on Security

What the NSA Collects via 702

New York Times reporter Charlie Savage writes about some bad statistics we're all using: Among surveillance legal policy specialists, it is common to cite a set...

Apple's FaceID
From Schneier on Security

Apple's FaceID

This is a good interview with Apple's SVP of Software Engineering about FaceID. Honestly, I don't know what to think. I am confident that Apple is not collecting...

Friday Squid Blogging: Another Giant Squid Caught off the Coast of Kerry
From Schneier on Security

Friday Squid Blogging: Another Giant Squid Caught off the Coast of Kerry

The Flannery family have caught four giant squid, two this year. As usual, you can also use this squid post to talk about the security stories in the news that...

Bluetooth Vulnerabilities
From Schneier on Security

Bluetooth Vulnerabilities

A bunch of Bluetooth vulnerabilities are being reported, some pretty nasty. BlueBorne concerns us because of the medium by which it operates. Unlike the majority...

Friday Squid Blogging: Using Squid Ink to Detect Gum Disease
From Schneier on Security

Friday Squid Blogging: Using Squid Ink to Detect Gum Disease

A new dental imagery method, using squid ink, light, and ultrasound. As usual, you can also use this squid post to talk about the security stories in the news that...

Another iPhone Change to Frustrate the Police
From Schneier on Security

Another iPhone Change to Frustrate the Police

I recently wrote about the new ability to disable the Touch ID login on iPhones. This is important because of a weirdness in current US law that protects people's...

Hacking  Robots
From Schneier on Security

Hacking Robots

Researchers have demonstrated hacks against robots, taking over and controlling their camera, speakers, and movements. News article....

On the Equifax Data Breach
From Schneier on Security

On the Equifax Data Breach

Last Thursday, Equifax reported a data breach that affects 143 million US customers, about 44% of the population. It's an extremely serious breach; hackers got...

Hacking Voice Assistant Systems with Inaudible Voice Commands
From Schneier on Security

Hacking Voice Assistant Systems with Inaudible Voice Commands

Turns out that all the major voice assistants -- Siri, Google Now, Samsung S Voice, Huawei HiVoice, Cortana and Alexa -- listen at audio frequencies the human ear...

Securing a Raspberry Pi
From Schneier on Security

Securing a Raspberry Pi

A Raspberry Pi is a tiny computer designed for markers and all sorts of Internet-of-Things types of projects. Make magazine has an article about securing it. Reading...

A Hardware Privacy Monitor for iPhones
From Schneier on Security

A Hardware Privacy Monitor for iPhones

Andrew "bunnie" Huang and Edward Snowden have designed a hardware device that attaches to an iPhone and monitors it for malicious surveillance activities, even...

Friday Squid Blogging: Make-Your-Own Squid Candy
From Schneier on Security

Friday Squid Blogging: Make-Your-Own Squid Candy

It's Japanese. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines...

ShadowBrokers Releases NSA UNITEDRAKE Manual
From Schneier on Security

ShadowBrokers Releases NSA UNITEDRAKE Manual

The ShadowBrokers released the manual for UNITEDRAKE, a sophisticated NSA Trojan that targets Windows machines: Able to compromise Windows PCs running on XP, Windows...

Research on What Motivates ISIS -- and Other -- Fighters
From Schneier on Security

Research on What Motivates ISIS -- and Other -- Fighters

Interesting research from Nature Human Behaviour: "The devoted actor's will to fight and the spiritual dimension of human conflict": Abstract: Frontline investigations...

Security Vulnerabilities in AT&T Routers
From Schneier on Security

Security Vulnerabilities in AT&T Routers

They're actually Arris routers, sold or given away by AT&T. There are several security vulnerabilities, some of them very serious. They can be fixed, but because...

Security Flaw in Estonian National ID Card
From Schneier on Security

Security Flaw in Estonian National ID Card

We have no idea how bad this really is: On 30 August, an international team of researchers informed the Estonian Information System Authority (RIA) of a vulnerability...

New Techniques in Fake Reviews
From Schneier on Security

New Techniques in Fake Reviews

Research paper: "Automated Crowdturfing Attacks and Defenses in Online Review Systems." Abstract: Malicious crowdsourcing forums are gaining traction as sources...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account