acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorschneier
bg-corner

The Legal Risks of Security Research
From Schneier on Security

The Legal Risks of Security Research

Sunoo Park and Kendra Albert have published “A Researcher’s Guide to Some Legal Risks of Security Research.” From a summary: Such risk extends beyond anti-hacking...

Friday Squid Blogging: Ram’s Horn Squid Video
From Schneier on Security

Friday Squid Blogging: Ram’s Horn Squid Video

This is the first video footage of a ram’s horn squid (Spirula spirula) . As usual, you can also use this squid post to talk about the security stories in the news...

Tracking Users on Waze
From Schneier on Security

Tracking Users on Waze

A security researcher discovered a wulnerability in Waze that breaks the anonymity of users: I found out that I can visit Waze from any web browser at waze.com/livemap...

Friday Squid Blogging: Underwater Robot Uses Squid-Like Propulsion
From Schneier on Security

Friday Squid Blogging: Underwater Robot Uses Squid-Like Propulsion

This is neat: By generating powerful streams of water, UCSD’s squid-like robot can swim untethered. The “squidbot” carries its own power source, and has the room...

The NSA is Refusing to Disclose its Policy on Backdooring Commercial Products
From Schneier on Security

The NSA is Refusing to Disclose its Policy on Backdooring Commercial Products

Senator Ron Wyden asked, and the NSA didn’t answer: The NSA has long sought agreements with technology companies under which they would build special access for...

Reverse-Engineering the Redactions in the Ghislaine Maxwell Deposition
From Schneier on Security

Reverse-Engineering the Redactions in the Ghislaine Maxwell Deposition

Slate magazine was able to cleverly read the Ghislaine Maxwell deposition and reverse-engineer many of the redacted names. We’ve long known that redacting is hard...

Friday Squid Blogging: Peru Defends Its Waters against Chinese Squid Fishing Boats
From Schneier on Security

Friday Squid Blogging: Peru Defends Its Waters against Chinese Squid Fishing Boats

Squid geopolitics. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines...

IMSI-Catchers from Canada
From Schneier on Security

IMSI-Catchers from Canada

Gizmodo is reporting that Harris Corp. is no longer selling Stingray IMSI-catchers (and, presumably, its follow-on models Hailstorm and Crossbow) to local governments...

New Report on Police Decryption Capabilities
From Schneier on Security

New Report on Police Decryption Capabilities

There is a new report on police decryption capabilities: specifically, mobile device forensic tools (MDFTs). Short summary: it’s not just the FBI that can do it...

NSA Advisory on Chinese Government Hacking
From Schneier on Security

NSA Advisory on Chinese Government Hacking

The NSA released an advisory listing the top twenty-five known vulnerabilities currently being exploited by Chinese nation-state attackers. This advisory provides...

Friday Squid Blogging: Interview with a Squid Researcher
From Schneier on Security

Friday Squid Blogging: Interview with a Squid Researcher

Interview with Mike Vecchione, Curator of Cephalopoda — now that’s a job title — at the Smithsonian Museum of National History. One reason they’re so interesting...

Cybersecurity Visuals
From Schneier on Security

Cybersecurity Visuals

The Hewlett Foundation just announced its top five ideas in its Cybersecurity Visuals Challenge. The problem Hewlett is trying to solve is the dearth of good visuals...

Split-Second Phantom Images Fool Autopilots
From Schneier on Security

Split-Second Phantom Images Fool Autopilots

Researchers are tricking autopilots by inserting split-second images into roadside billboards. Researchers at Israel’s Ben Gurion University of the Negev … previously...

Upcoming Speaking Engagements
From Schneier on Security

Upcoming Speaking Engagements

This is a current list of where and when I am scheduled to speak: I’ll be speaking at Cyber Week Online, October 19-21, 2020. I’ll be speaking at the IEEE Symposium...

US Cyber Command and Microsoft Are Both Disrupting TrickBot
From Schneier on Security

US Cyber Command and Microsoft Are Both Disrupting TrickBot

Earlier this month, we learned that someone is disrupting the TrickBot botnet network. Over the past 10 days, someone has been launching a series of coordinated...

2020 Workshop on Economics of Information Security
From Schneier on Security

2020 Workshop on Economics of Information Security

The Workshop on Economics of Information Security will be online this year. Register here.

Google Responds to Warrants for “About” Searches
From Schneier on Security

Google Responds to Warrants for “About” Searches

One of the things we learned from the Snowden documents is that the NSA conducts “about” searches. That is, searches based on activities and not identifiers. A...

Hacking Apple for Profit
From Schneier on Security

Hacking Apple for Profit

Five researchers hacked Apple Computer’s networks — not their products — and found fifty-five vulnerabilities. So far, they have received $289K. One of the worst...

Friday Squid Blogging: Squid-like Nebula
From Schneier on Security

Friday Squid Blogging: Squid-like Nebula

Pretty astronomical photo. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting...

Friday Squid Blogging: Saving the Humboldt Squid
From Schneier on Security

Friday Squid Blogging: Saving the Humboldt Squid

Genetic research finds the Humboldt squid is vulnerable to overfishing. As usual, you can also use this squid post to talk about the security stories in the news...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account