acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorschneier
bg-corner

Storing Encrypted Photos in Google’s Cloud
From Schneier on Security

Storing Encrypted Photos in Google’s Cloud

New paper: “Encrypted Cloud Photo Storage Using Google Photos“: Abstract: Cloud photo services are widely used for persistent, convenient, and often free photo...

I Am Parting With My Crypto Library
From Schneier on Security

I Am Parting With My Crypto Library

The time has come for me to find a new home for my (paper) cryptography library. It’s about 150 linear feet of books, conference proceedings, journals, and monographs...

Friday Squid Blogging: Squid Skin Is Naturally Anti-microbial
From Schneier on Security

Friday Squid Blogging: Squid Skin Is Naturally Anti-microbial

Often it feels like squid just evolved better than us mammals. As usual, you can also use this squid post to talk about the security stories in the news that Ihere...

AirDropped Gun Photo Causes Terrorist Scare
From Schneier on Security

AirDropped Gun Photo Causes Terrorist Scare

A teenager on an airplane sent a photo of a replica gun via AirDrop to everyone who had their settings configured to receive unsolicited photos from strangers.these...

De-anonymization Story
From Schneier on Security

De-anonymization Story

This is important: Monsignor Jeffrey Burrill was general secretary of the US Conference of Catholic Bishops (USCCB), effectively the highest-ranking priest inreportedly...

Hiding Malware in ML Models
From Schneier on Security

Hiding Malware in ML Models

Interesting research: “EvilModel: Hiding Malware Inside of Neural Network Models”. Abstract: Delivering malware covertly and detection-evadingly is critical to...

Disrupting Ransomware by Disrupting Bitcoin
From Schneier on Security

Disrupting Ransomware by Disrupting Bitcoin

Ransomware isn’t new; the idea dates back to 1986 with the “Brain” computer virus. Now, it’s become the criminal business model of the internet for two reasons....

Commercial Location Data Used to Out Priest
From Schneier on Security

Commercial Location Data Used to Out Priest

A Catholic priest was outed through commercially available surveillance data. Vice has a good analysis: The news starkly demonstrates not only the inherent power...

Nasty Printer Driver Vulnerability
From Schneier on Security

Nasty Printer Driver Vulnerability

From SentinelLabs, a critical vulnerability in HP printer drivers: Researchers have released technical details on a high-severity privilege-escalation flaw in...

NSO Group Hacked
From Schneier on Security

NSO Group Hacked

NSO Group, the Israeli cyberweapons arms manufacturer behind the Pegasus spyware — used by authoritarian regimes around the world to spy on dissidents, journalists...

Candiru: Another Cyberweapons Arms Manufacturer
From Schneier on Security

Candiru: Another Cyberweapons Arms Manufacturer

Citizen Lab has identified yet another Israeli company that sells spyware to governments around the world: Candiru. From the report: Summary: Candiru is a secretive...

REvil is Off-Line
From Schneier on Security

REvil is Off-Line

This is an interesting development: Just days after President Biden demanded that President Vladimir V. Putin of Russia shut down ransomware groups attacking American...

Upcoming Speaking Engagements
From Schneier on Security

Upcoming Speaking Engagements

This is a current list of where and when I am scheduled to speak: I’m speaking at Norbert Wiener in the 21st Century, a virtual conference hosted by The IEEE Society...

Colorado Passes Consumer Privacy Law
From Schneier on Security

Colorado Passes Consumer Privacy Law

First California. Then Virginia. Now Colorado. Here’s a good comparison of the three states’ laws.

China Taking Control of Zero-Day Exploits
From Schneier on Security

China Taking Control of Zero-Day Exploits

China is making sure that all newly discovered zero-day exploits are disclosed to the government. Under the new rules, anyone in China who finds a vulnerability...

Iranian State-Sponsored Hacking Attempts
From Schneier on Security

Iranian State-Sponsored Hacking Attempts

Interesting attack: Masquerading as UK scholars with the University of London’s School of Oriental and African Studies (SOAS), the threat actor TA453 has been covertly...

Friday Squid Blogging: The Evolution of Squid
From Schneier on Security

Friday Squid Blogging: The Evolution of Squid

Good video about the evolutionary history of squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered...

Analysis of the FBI’s Anom Phone
From Schneier on Security

Analysis of the FBI’s Anom Phone

Motherboard got its hands on one of those Anom phones that were really FBI honeypots. The details are interesting.

Details of the REvil Ransomware Attack
From Schneier on Security

Details of the REvil Ransomware Attack

ArsTechnica has a good story on the REvil ransomware attack of last weekend, with technical details: This weekend’s attack was carried out with almost surgical...

Vulnerability in the Kaspersky Password Manager
From Schneier on Security

Vulnerability in the Kaspersky Password Manager

A vulnerability (just patched) in the random number generator used in the Kaspersky Password Manager resulted in easily guessable passwords: The password generator...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account