acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorschneier
bg-corner

Credential Stealing as an Attack Vector
From Schneier on Security

Credential Stealing as an Attack Vector

Traditional computer security concerns itself with vulnerabilities. We employ antivirus software to detect malware that exploits vulnerabilities. We have automatic...

Julian Sanchez on the Feinstein-Burr Bill
From Schneier on Security

Julian Sanchez on the Feinstein-Burr Bill

Two excellent posts....

Fake Security Conferences
From Schneier on Security

Fake Security Conferences

Turns out there are two different conferences with the title International Conference on Cyber Security (ICCS 2016), one real and one fake. Richard Clayton has...

Vulnerabilities in Samsung's SmartThings
From Schneier on Security

Vulnerabilities in Samsung's SmartThings

Interesting research: Earlence Fernandes, Jaeyeon Jung, and Atul Prakash, "Security Analysis of Emerging Smart Home Applications": Abstract: Recently, several competing...

Friday Squid Blogging: Global Squid Shortage
From Schneier on Security

Friday Squid Blogging: Global Squid Shortage

There's a squid shortage along the Pacific coast of the Americas. As usual, you can also use this squid post to talk about the security stories in the news that...

I'm Writing a Book on Security
From Schneier on Security

I'm Writing a Book on Security

I'm writing a book on security in the highly connected Internet-of-Things World. Tentative title: Click Here to Kill Everything Peril and Promise in a Hyper-connected...

Documenting the Chilling Effects of NSA Surveillance
From Schneier on Security

Documenting the Chilling Effects of NSA Surveillance

In Data and Golliath, I talk about the self-censorship that comes along with broad surveillance. This interesting research documents this phenomenon in Wikipedia...

Amazon Unlimited Fraud
From Schneier on Security

Amazon Unlimited Fraud

Amazon Unlimited is a all-you-can-read service. You pay one price and can read anything that's in the program. Amazon pays authors out of a fixed pool, on the basis...

Two Good Readings on the Encryption "Going Dark" Debate
From Schneier on Security

Two Good Readings on the Encryption "Going Dark" Debate

Testimonies of Matt Blaze and Danny Weitzner, both on April 19th before the House Energy and Commerce Committee. And the hearing....

People Trust Robots, Even When They Don't Inspire Trust
From Schneier on Security

People Trust Robots, Even When They Don't Inspire Trust

Interesting research: In the study, sponsored in part by the Air Force Office of Scientific Research (AFOSR), the researchers recruited a group of 42 volunteers...

Graffiti by Drone
From Schneier on Security

Graffiti by Drone

Drones can graffiti walls that no person can reach. (Note that wired.com blocks ad blockers. My trick is to copy the page and then paste it into my text editor.)...

BlackBerry's Global Encryption Key
From Schneier on Security

BlackBerry's Global Encryption Key

Last week there was a big news story about the Blackberry encryption. The news was that all BlackBerry devices share a global encryption key, and that the Canadian...

Friday Squid Blogging: My Little Cephalopod
From Schneier on Security

Friday Squid Blogging: My Little Cephalopod

I assume this is more amusing to people who know about My Little Pony. As usual, you can also use this squid post to talk about the security stories in the news...

Encryption Backdoor Cartoons
From Schneier on Security

Encryption Backdoor Cartoons

Dilbert has a series: 1, 2, 3, 4, and 5. SMBC. And three more that make it clear this is a security vs. surveillance debate. Also this....

Cheating in Bicycle Races with Tiny Hidden Motors
From Schneier on Security

Cheating in Bicycle Races with Tiny Hidden Motors

If doping weren't enough, cyclists are cheating in races by hiding tiny motors in their bicycles. There are many detection techniques: For its report, Stade 2 positioned...

How Hacking Team Got Hacked
From Schneier on Security

How Hacking Team Got Hacked

The hacker who hacked Hacking Team posted a lengthy description of how he broke into the company and stole everything. Two articles. ETA: This post originally had...

Helen Nissenbaum on Regulating Data Collection and Use
From Schneier on Security

Helen Nissenbaum on Regulating Data Collection and Use

NYU Helen Nissenbaum gave an excellent lecture at Brown University last month, where she rebutted those who think that we should not regulate data collection, only...

GCHQ Gets Involved in Mundane Surveillance Matters
From Schneier on Security

GCHQ Gets Involved in Mundane Surveillance Matters

GCHQ detected a potential pre-publication leak of a Harry Potter book, and alerted the publisher. Is this what British national intelligence is supposed to be doing...

Details about Juniper's Firewall Backdoor
From Schneier on Security

Details about Juniper's Firewall Backdoor

Last year, we learned about a backdoor in Juniper firewalls, one that seems to have been added into the code base. There's now some good research: "A Systematic...

Kuwaiti Government will DNA Test Everyone
From Schneier on Security

Kuwaiti Government will DNA Test Everyone

There's a new law that will enforce DNA testing for everyone: citizens, expatriates, and visitors. They promise that the program "does not include genealogical...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account