acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorschneier
bg-corner

Two Security Companies Battling It Out over Disclosures
From Schneier on Security

Two Security Companies Battling It Out over Disclosures

Okay, this is weird. FireEye has gone to court to prevent ERNW from disclosing vulnerabilities in FireEye products. FireEye should know better. Here's FireEye's...

Self-Destructing Computer Chip
From Schneier on Security

Self-Destructing Computer Chip

The chip is built on glass: Shattering the glass is straightforward. When the proper circuit is toggled, a small resistor within the substrate heats up until the...

Anonymous Browsing at the Library
From Schneier on Security

Anonymous Browsing at the Library

A rural New Hampshire library decided to install Tor on their computers and allow anonymous Internet browsing. The Department of Homeland pressured them to stop...

Child Arrested Because Adults Are Stupid
From Schneier on Security

Child Arrested Because Adults Are Stupid

A Texas 9th-grader makes an electronic clock and brings it to school. Teachers immediately become stupid and call the police: The bell rang at least twice, he said...

Obama and the Security of the Waldorf Astoria Hotel
From Schneier on Security

Obama and the Security of the Waldorf Astoria Hotel

President Obama won't stay at the Waldorf Astoria Hotel in New York because of security concerns. The hotel "was bought last year by Chinese investors with deep...

Hacking Team, Computer Vulnerabilities, and the NSA
From Schneier on Security

Hacking Team, Computer Vulnerabilities, and the NSA

When the National Security Administration (NSA) -- or any government agency -- discovers a vulnerability in a popular computer system, should it disclose it or...

Security Cartoon
From Schneier on Security

Security Cartoon

"Security vs. privacy."...

Programming Errors Weaken bcrypt Hashes of Ashley Madison Passwords
From Schneier on Security

Programming Errors Weaken bcrypt Hashes of Ashley Madison Passwords

Ashley Madison encrypted users' passwords using the bcrypt function. It's a secure password-encryption function, but two implemention programming mistakes allows...

Friday Squid Blogging: The Chemistry of Squid Camouflage
From Schneier on Security

Friday Squid Blogging: The Chemistry of Squid Camouflage

Interesting research. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Wanted: Cryptography Products for Worldwide Survey
From Schneier on Security

Wanted: Cryptography Products for Worldwide Survey

In 1999, Lance Hoffman, David Balenson, and others published a survey of non-US cryptographic products. The point of the survey was to illustrate that there was...

Drone Self-Defense and the Law
From Schneier on Security

Drone Self-Defense and the Law

Last month, a Kentucky man shot down a drone that was hovering near his backyard. WDRB News reported that the camera drone's owners soon showed up at the home of...

Cheating News from the Chess World
From Schneier on Security

Cheating News from the Chess World

Chess player caught cheating at a tournament: I kept on looking at him. He was always sitting down, he never got up. It was very strange; we are taking about hours...

FBI and Apple's Encryption
From Schneier on Security

FBI and Apple's Encryption

The New York Times is reporting that Apple encryption is hampering an FBI investigation: In an investigation involving guns and drugs, the Justice Department obtained...

Animals vs. Drones
From Schneier on Security

Animals vs. Drones

It's not just humans who dislike the small flying objects. YouTube has videos of drones being stared at quizzically by a moose, harassed by a raven, attacked by...

The Security Risks of Third-party Data
From Schneier on Security

The Security Risks of Third-party Data

Most of us get to be thoroughly relieved that our emails weren't in the Ashley Madison database. But don't get too comfortable. Whatever secrets you have, even...

TSA Master Keys
From Schneier on Security

TSA Master Keys

Someone recently noticed a Washington Post story on the TSA that originally contained a detailed photograph of all the TSA master keys. It's now blurred out of...

Glenn Greenwald Debates Keith Alexander
From Schneier on Security

Glenn Greenwald Debates Keith Alexander

Interesting debate, surprisingly civil. Alexander seemed to have been okay with Snowden revealing surveillance based on Section 215: "If he had taken the one court...

Understanding Squid Self-Healing Teeth
From Schneier on Security

Understanding Squid Self-Healing Teeth

Using squid teeth as a model, researchers have created "the first material that heals itself in water." Paper from Nature. As usual, you can also use this squid...

I'll be Talking Cyber-Resilience on a Webinar
From Schneier on Security

I'll be Talking Cyber-Resilience on a Webinar

This coming Thursday, I'll be talking with Larry Poneman about cyber-resilience and the results of a new survey he's releasing. Join us here. The event is sponsored...

China's "Great Cannon"
From Schneier on Security

China's "Great Cannon"

Interesting research: "An Analysis of China's 'Great Cannon.'" Abstract: On March 16th, 2015, the Chinese censorship apparatus employed a new tool, the "Great Cannon"...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account