acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorschneier
bg-corner

Hacking Bridge-Hand Generation Software
From Schneier on Security

Hacking Bridge-Hand Generation Software

Interesting: Roughly three weeks later, there is a operation program available to crack ACBL hand records. Given three consecutive boards, all the remaining boards...

Hacking Wireless Tire-Pressure Monitoring System
From Schneier on Security

Hacking Wireless Tire-Pressure Monitoring System

Research paper: "Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study," by Ishtiaq Rouf, Rob Miller, Hossen...

Recovering an iPhone 5c Passcode
From Schneier on Security

Recovering an iPhone 5c Passcode

Remember the San Bernadino killer's iPhone, and how the FBI maintained that they couldn't get the encryption key without Apple providing them with a universal back...

Organizational Doxing and Disinformation
From Schneier on Security

Organizational Doxing and Disinformation

In the past few years, the devastating effects of hackers breaking into an organization's network, stealing confidential data, and publishing everything have been...

Someone Is Learning How to Take Down the Internet
From Schneier on Security

Someone Is Learning How to Take Down the Internet

Over the past year or two, someone has been probing the defenses of the companies that run critical pieces of the Internet. These probes take the form of precisely...

Leaked Stingray Manuals
From Schneier on Security

Leaked Stingray Manuals

The Intercept has published the manuals for Harris Corporation's IMSI catcher: Stingray. It's an impressive surveillance device....

USB Kill Stick
From Schneier on Security

USB Kill Stick

It costs less than $60. For just a few bucks, you can pick up a USB stick that destroys almost anything that it's plugged into. Laptops, PCs, televisions, photo...

Malware Infects Network Hard Drives
From Schneier on Security

Malware Infects Network Hard Drives

The malware "Mal/Miner-C" infects Internet-exposed Seagate Central Network Attached Storage (NAS) devices, and from there takes over connected computers to mine...

Friday Squid Blogging: More Research Inspired by Squid Skin
From Schneier on Security

Friday Squid Blogging: More Research Inspired by Squid Skin

Research on color-changing materials: What do squid and jellyfish skin have in common with human skin? All three have inspired a team of chemists to create materials...

Leaked Product Demo from RCS Labs
From Schneier on Security

Leaked Product Demo from RCS Labs

We have leak from yet another cyberweapons arms manufacturer: the Italian company RCS Labs. Vice Motherboard reports on a surveillance video demo: The video shows...

DDOS for Profit
From Schneier on Security

DDOS for Profit

Brian Krebs reports that the Israeli DDOS service vDOS has earned $600K in the past two years. The information was obtained from a hack and data dump of the company's...

Apple's Cloud Key Vault
From Schneier on Security

Apple's Cloud Key Vault

Ever since Ian Kristi, Apple's Head of Security Engineering and Architecture, presented the company's key backup technology at Black Hat 2016, people have been...

Talk by the Former Head of French SIGINT
From Schneier on Security

Talk by the Former Head of French SIGINT

For former head of French SIGINT gave a talk (removed from YouTube where he talked about a lot of things he probably shouldn't have. If anyone has 1) a transcript...

Internet Disinformation Service for Hire
From Schneier on Security

Internet Disinformation Service for Hire

Yet another leaked catalog of Internet attack services, this one specializing in disinformation: But Aglaya had much more to offer, according to its brochure. For...

Spy Equipment from Cobham
From Schneier on Security

Spy Equipment from Cobham

The Intercept has published a 120-page catalog of spy gear from the British defense company Cobham. This is equipment available to police forces. The catalog was...

Friday Squid Blogging: Korean Spicy Grilled Squid
From Schneier on Security

Friday Squid Blogging: Korean Spicy Grilled Squid

Easy recipe. You can get the red pepper flakes and red pepper paste at most grocery stores. As usual, you can also use this squid post to talk about the security...

Cybercrime as a Tax on the Internet Economy
From Schneier on Security

Cybercrime as a Tax on the Internet Economy

I was reading this 2014 McAfee report on the economic impact of cybercrime, and came across this interesting quote on how security is a tax on the Internet economy...

NSO Group
From Schneier on Security

NSO Group

We're starting to see some information on the Israeli cyber-weapons arms manufacturer that sold the iPhone zero-day exploit to the United Arab Emirates so they...

Using Wi-Fi Signals to Identify People by Body Shape
From Schneier on Security

Using Wi-Fi Signals to Identify People by Body Shape

Another paper on using Wi-Fi for surveillance. This one is on identifying people by their body shape. "FreeSense:Indoor Human Identification with WiFi Signals":...

Keystroke Recognition from Wi-Fi Distortion
From Schneier on Security

Keystroke Recognition from Wi-Fi Distortion

This is interesting research: "Keystroke Recognition Using WiFi Signals." Basically, the user's hand positions as they type distorts the Wi-Fi signal in predictable...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account