acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorschneier
bg-corner

Friday Squid Blogging: Squid Beard
From Schneier on Security

Friday Squid Blogging: Squid Beard

Impressive. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Lessons from the Sony Hack
From Schneier on Security

Lessons from the Sony Hack

Earlier this month, a mysterious group that calls itself Guardians of Peace hacked into Sony Pictures Entertainment's computer systems and began revealing many...

SS7 Vulnerabilities
From Schneier on Security

SS7 Vulnerabilities

There are security vulnerability in the phone-call routing protocol called SS7. The flaws discovered by the German researchers are actually functions built into...

ISIS Cyberattacks
From Schneier on Security

ISIS Cyberattacks

Citizen Lab has a new report on a probable ISIS-launched cyberattack: This report describes a malware attack with circumstantial links to the Islamic State in Iraq...

The Limits of Police Subterfuge
From Schneier on Security

The Limits of Police Subterfuge

"The next time you call for assistance because the Internet service in your home is not working, the 'technician' who comes to your door may actually be an undercover...

How the FBI Unmasked Tor Users
From Schneier on Security

How the FBI Unmasked Tor Users

Kevin Poulson has a good article up on Wired about how the FBI used a Metasploit variant to identity Tor users....

Fake Cell Towers Found in Norway
From Schneier on Security

Fake Cell Towers Found in Norway

In yet another example of what happens when you build an insecure communications infrastructure, fake cell phone towers have been found in Oslo. No one knows who...

Understanding Zero-Knowledge Proofs
From Schneier on Security

Understanding Zero-Knowledge Proofs

Matthew Green has a good primer....

Over 700 Million People Taking Steps to Avoid NSA Surveillance
From Schneier on Security

Over 700 Million People Taking Steps to Avoid NSA Surveillance

There's a new international survey on Internet security and trust, of "23,376 Internet users in 24 countries," including "Australia, Brazil, Canada, China, Egypt...

Friday Squid Blogging: Recreational Squid Fishing in Washington State
From Schneier on Security

Friday Squid Blogging: Recreational Squid Fishing in Washington State

There is year-round recreational squid fishing from the Strait of Juan de Fuca to south Puget Sound. A nighttime sport that requires simple, inexpensive fishing...

Incident Response Webinar on Thursday
From Schneier on Security

Incident Response Webinar on Thursday

On 12/18 I'll be part of a Co3 webinar where we examine incident-response trends of 2014 and look ahead to 2015. I tend not to do these, but this is an exception...

Who Might Control Your Telephone Metadata
From Schneier on Security

Who Might Control Your Telephone Metadata

Remember last winter when President Obama called for an end to the NSA's telephone metadata collection program? He didn't actually call for an end to it; he just...

Comments on the Sony Hack
From Schneier on Security

Comments on the Sony Hack

I don't have a lot to say about the Sony hack, which seems to still be ongoing. I want to highlight a few points, though. At this point, the attacks seem to be...

Not Enough CISOs to Go Around
From Schneier on Security

Not Enough CISOs to Go Around

This article is reporting that the demand for Chief Information Security Officers far exceeds supply: Sony and every other company that realizes the need for a...

Effects of Terrorism Fears
From Schneier on Security

Effects of Terrorism Fears

Interesting article: "How terrorism fears are transforming America's public space." I am reminded of my essay from four years ago: "Close the Washington Monument...

NSA Hacking of Cell Phone Networks
From Schneier on Security

NSA Hacking of Cell Phone Networks

The Intercept has published an article -- based on the Snowden documents -- about AURORAGOLD, an NSA surveillance operation against cell phone network operators...

Rapiscan Full-Body Scanner for Sale
From Schneier on Security

Rapiscan Full-Body Scanner for Sale

Government surplus. Only $8,000 on eBay. Note that this device has been analyzed before....

Corporate Abuse of our Data
From Schneier on Security

Corporate Abuse of our Data

Last week, we learned about a striking piece of malware called Regin that has been infecting computer networks worldwide since 2008. It's more sophisticated than...

Friday Squid Blogging: Squid Poaching off the Coast of Japan
From Schneier on Security

Friday Squid Blogging: Squid Poaching off the Coast of Japan

There has been an increase in squid poaching by North Korea out of Japanese territorial waters. As usual, you can also use this squid post to talk about the security...

Surveillance Cartoon
From Schneier on Security

Surveillance Cartoon

Funny....
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account