acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorschneier
bg-corner

Iran’s Digital Surveillance Tools Leaked
From Schneier on Security

Iran’s Digital Surveillance Tools Leaked

It’s Iran’s turn to have its digital surveillance tools leaked: According to these internal documents, SIAM is a computer system that works behind the scenes of...

Apple Only Commits to Patching Latest OS Version
From Schneier on Security

Apple Only Commits to Patching Latest OS Version

People have suspected this for a while, but Apple has made it official. It only commits to fully patching the latest version of its OS, even though it claims to...

Friday Squid Blogging: Chinese Squid Fishing
From Schneier on Security

Friday Squid Blogging: Chinese Squid Fishing

China claims that it is “engaging in responsible squid fishing”: Chen Xinjun, dean of the College of Marine Sciences at Shanghai Ocean University, made the remarks...

Critical Vulnerability in Open SSL
From Schneier on Security

Critical Vulnerability in Open SSL

There are no details yet, but it’s really important that you patch Open SSL 3.x when the new version comes out on Tuesday. How bad is “Critical”? According tocritical...

Australia Increases Fines for Massive Data Breaches
From Schneier on Security

Australia Increases Fines for Massive Data Breaches

After suffering two large, and embarrassing, data breaches in recent weeks, the Australian government increased the fine for serious data breaches from $2.2 million...

On the Randomness of Automatic Card Shufflers
From Schneier on Security

On the Randomness of Automatic Card Shufflers

Many years ago, Matt Blaze and I talked about getting our hands on a casino-grade automatic shuffler and looking for vulnerabilities. We never did it—I remember...

Friday Squid Blogging: The Reproductive Habits of Giant Squid
From Schneier on Security

Friday Squid Blogging: The Reproductive Habits of Giant Squid

Interesting: A recent study on giant squid that have washed ashore along the Sea of Japan coast has raised the possibility that the animal has a different reproductive...

Adversarial ML Attack that Secretly Gives a Language Model a Point of View
From Schneier on Security

Adversarial ML Attack that Secretly Gives a Language Model a Point of View

Machine learning security is extraordinarily difficult because the attacks are so varied—and it seems that each new one is weirder than the next. Here’s the latest...

Interview with Signal’s New President
From Schneier on Security

Interview with Signal’s New President

Long and interesting interview with Signal’s new president, Meredith Whittaker: WhatsApp uses the Signal encryption protocol to provide encryption for its messages...

Museum Security
From Schneier on Security

Museum Security

Interesting interview: Banks don’t take millions of dollars and put them in plastic bags and hang them on the wall so everybody can walk right up to them. But we...

Qatar Spyware
From Schneier on Security

Qatar Spyware

Everyone visiting Qatar for the World Cup needs to install spyware on their phone. Everyone travelling to Qatar during the football World Cup will be asked to...

Hacking Automobile Keyless Entry Systems
From Schneier on Security

Hacking Automobile Keyless Entry Systems

Suspected members of a European car-theft ring have been arrested: The criminals targeted vehicles with keyless entry and start systems, exploiting the technology...

Friday Squid Blogging: On Squid Ink
From Schneier on Security

Friday Squid Blogging: On Squid Ink

It’s aimed at children, but it’s a good primer. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered...

Upcoming Speaking Engagements
From Schneier on Security

Upcoming Speaking Engagements

This is a current list of where and when I am scheduled to speak: I’m speaking at the World Ethical Data Forum, online, October 26-28, 2022. I’m speaking at the...

Regulating DAOs
From Schneier on Security

Regulating DAOs

In August, the US Treasury’s Office of Foreign Assets Control (OFAC) sanctioned the cryptocurrency platform Tornado Cash, a virtual currency “mixer” designed to...

Check What Information Your Browser Leaks
From Schneier on Security

Check What Information Your Browser Leaks

These two sites tell you what sorts of information you’re leaking from your browser.

Friday Squid Blogging: Person in Squid Suit Takes Dog for a Walk
From Schneier on Security

Friday Squid Blogging: Person in Squid Suit Takes Dog for a Walk

No, I don’t understand it, either. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog...

I Am Not Satoshi Nakamoto
From Schneier on Security

I Am Not Satoshi Nakamoto

This isn’t the first time I’ve received an e-mail like this: Hey! I’ve done my research and looked at a lot of facts and old forgotten archives. I know that you...

Tracking Stolen Cryptocurrencies
From Schneier on Security

Tracking Stolen Cryptocurrencies

Good article about the current state of cryptocurrency forensics.

The Proliferation of Zero-days
From Schneier on Security

The Proliferation of Zero-days

The MIT Technology Review is reporting that 2021 is a blockbuster year for zero-day exploits: One contributing factor in the higher rate of reported zero-days...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account