acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorschneier
bg-corner

Quantum Tokens for Digital Signatures
From Schneier on Security

Quantum Tokens for Digital Signatures

This paper wins "best abstract" award: "Quantum Tokens for Digital Signatures," by Shalev Ben David and Or Sattath: Abstract: The fisherman caught a quantum fish...

Credit Cards with Changing CVVs
From Schneier on Security

Credit Cards with Changing CVVs

There's a new French credit card where the CVV code changes every hour....

Is WhatsApp Hacked?
From Schneier on Security

Is WhatsApp Hacked?

Forbes is reporting that the Israeli cyberweapons arms manufacturer Wintego has a man-in-the-middle exploit against WhatsApp. It's a weird story. I'm not sure how...

US and China in Cyberspace
From Schneier on Security

US and China in Cyberspace

This article on US/China cooperation and competition in cyberspace is an interesting lens through which to examine security policy....

The Culture of Cybersecurity
From Schneier on Security

The Culture of Cybersecurity

Interesting survey of the cybersecurity culture in Norway. 96% of all Norwegian are online, more than 90% embrace new technology, and 6 of 10 feel capable of judging...

Security Design: Stop Trying to Fix the User
From Schneier on Security

Security Design: Stop Trying to Fix the User

Every few years, a researcher replicates a security study by littering USB sticks around an organization's grounds and waiting to see how many people pick them...

Friday Squid Blogging: Cannibal Squid
From Schneier on Security

Friday Squid Blogging: Cannibal Squid

The Gonatus squid eats its own kind. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

The Hacking of Yahoo
From Schneier on Security

The Hacking of Yahoo

Last week, Yahoo! announced that it was hacked pretty massively in 2014. Over half a billion usernames and passwords were affected, making this the largest data...

The Cost of Cyberattacks Is Less than You Might Think
From Schneier on Security

The Cost of Cyberattacks Is Less than You Might Think

Interesting research from Sasha Romanosky at RAND: Abstract: In 2013, the US President signed an executive order designed to help secure the nation's critical infrastructure...

Malware Tries to Detect Test Environment
From Schneier on Security

Malware Tries to Detect Test Environment

A new malware tries to detect if it's running in a virtual machine or sandboxed test environment by looking for signs of normal use and not executing if they're...

Using Neural Networks to Identify Blurred Faces
From Schneier on Security

Using Neural Networks to Identify Blurred Faces

Neural networks are good at identifying faces, even if they're blurry: In a paper released earlier this month, researchers at UT Austin and Cornell University demonstrate...

Brian Krebs DDoS
From Schneier on Security

Brian Krebs DDoS

Brian Krebs writes about the massive DDoS attack against his site. In fact, the site is down as I post this....

Friday Squid Blogging: Space Kraken
From Schneier on Security

Friday Squid Blogging: Space Kraken

A Lego model of a giant space kraken destroying a Destroyer from Star Wars. As usual, you can also use this squid post to talk about the security stories in the...

iPhone 7 Jailbreak
From Schneier on Security

iPhone 7 Jailbreak

It took 24 hours. Slashdot thread....

Amtrak Security Awareness
From Schneier on Security

Amtrak Security Awareness

I like this Amtrak security awareness campaign. Especially the use of my term "security theater."...

Tesla Model S Hack
From Schneier on Security

Tesla Model S Hack

Impressive remote ,a href="http://www.pcworld.com/article/3121999/security/researchers-demonstrate-remote-attack-against-tesla-model-s.html">hack of the Tesla Model...

Two Good Essays on the NSA's "Upstream" Data Collection under Section 702
From Schneier on Security

Two Good Essays on the NSA's "Upstream" Data Collection under Section 702

Both are worth reading....

More on the Equities Debate
From Schneier on Security

More on the Equities Debate

This is an interesting back-and-forth: initial post by Dave Aitel and Matt Tait, a reply by Mailyn Filder, a short reply by Aitel, and a reply to the reply by Filder...

Periscope ATM Skimmers
From Schneier on Security

Periscope ATM Skimmers

"Periscope skimmers" are the most sophisticated kind of ATM skimmers. They are entirely inside the ATM, meaning they're impossible to notice. They're been found...

Friday Squid Blogging: Giant Squid on Japanese Television
From Schneier on Security

Friday Squid Blogging: Giant Squid on Japanese Television

I got this video from PZ Myers's blog. I know absolutely nothing about it. As usual, you can also use this squid post to talk about the security stories in the...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account