acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorschneier
bg-corner

Newly Declassified Study Demonstrates Uselessness of NSA's Phone Metadata Program
From Schneier on Security

Newly Declassified Study Demonstrates Uselessness of NSA's Phone Metadata Program

The New York Times is reporting on the NSA's phone metadata program, which the NSA shut down last year: A National Security Agency system that analyzed logs of...

Firefox Enables DNS over HTTPS
From Schneier on Security

Firefox Enables DNS over HTTPS

This is good news: Whenever you visit a website -- even if it's HTTPS enabled -- the DNS query that converts the web address into an IP address that computers can...

Russia Is Trying to Tap Transatlantic Cables
From Schneier on Security

Russia Is Trying to Tap Transatlantic Cables

The Times of London is reporting that Russian agents are in Ireland probing transatlantic communications cables. Ireland is the landing point for undersea cables...

Friday Squid Blogging: 13-foot Giant Squid Caught off New Zealand Coast
From Schneier on Security

Friday Squid Blogging: 13-foot Giant Squid Caught off New Zealand Coast

It's probably a juvenile: Researchers aboard the New Zealand-based National Institute of Water and Atmospheric Research Ltd (NIWA) research vessel Tangaroa were...

Inrupt, Tim Berners-Lee's Solid, and Me
From Schneier on Security

Inrupt, Tim Berners-Lee's Solid, and Me

For decades, I have been talking about the importance of individual privacy. For almost as long, I have been using the metaphor of digital feudalism to describe...

Policy vs Technology
From Schneier on Security

Policy vs Technology

Sometime around 1993 or 1994, during the first Crypto Wars, I was part of a group of cryptography experts that went to Washington to advocate for strong encryption...

Internet of Things Candle
From Schneier on Security

Internet of Things Candle

There's a Kickstarter for an actual candle, with real fire, that you can control over the Internet. What could possibly go wrong?...

Hacking McDonald's for Free Food
From Schneier on Security

Hacking McDonald's for Free Food

This hack was possible because the McDonald's app didn't authenticate the server, and just did whatever the server told it to do: McDonald's receipts in Germany...

Voatz Internet Voting App Is Insecure
From Schneier on Security

Voatz Internet Voting App Is Insecure

This paper describes the flaws in the Voatz Internet voting app: "The Ballot is Busted Before the Blockchain: A Security Analysis of Voatz, the First Internet Voting...

Friday Squid Blogging: Squids Are as Intelligent as Dogs
From Schneier on Security

Friday Squid Blogging: Squids Are as Intelligent as Dogs

More news based on the squid brain MRI scan: the complexity of their brains are comparable to dogs. As usual, you can also use this squid post to talk about the...

Upcoming Speaking Engagements
From Schneier on Security

Upcoming Speaking Engagements

This is a current list of where and when I am scheduled to speak: I'll be at RSA Conference 2020 in San Francisco. On Wednesday, February 26, at 2:50 PM, I'll be...

DNSSEC Keysigning Ceremony Postponed Because of Locked Safe
From Schneier on Security

DNSSEC Keysigning Ceremony Postponed Because of Locked Safe

Interesting collision of real-world and Internet security: The ceremony sees several trusted internet engineers (a minimum of three and up to seven) from across...

A US Data Protection Agency
From Schneier on Security

A US Data Protection Agency

The United States is one of the few democracies without some formal data protection agency, and we need one. Senator Gillibrand just proposed creating one....

Companies that Scrape Your Email
From Schneier on Security

Companies that Scrape Your Email

Motherboard has a long article on apps -- Edison, Slice, and Cleanfox -- that spy on your email by scraping your screen, and then sell that information to others...

Crypto AG Was Owned by the CIA
From Schneier on Security

Crypto AG Was Owned by the CIA

The Swiss cryptography firm Crypto AG sold equipment to governments and militaries around the world for decades after World War II. They were owned by the CIA:...

Apple's Tracking-Prevention Feature in Safari has a Privacy Bug
From Schneier on Security

Apple's Tracking-Prevention Feature in Safari has a Privacy Bug

Last month, engineers at Google published a very curious privacy bug in Apple's Safari web browser. Apple's Intelligent Tracking Prevention, a feature designed...

Friday Squid Blogging: An MRI Scan of a Squid's Brain
From Schneier on Security

Friday Squid Blogging: An MRI Scan of a Squid's Brain

This paper is filled with brain science that I do not understand (news article), but fails to answer what I consider to be the important question: how do you keep...

Security in 2020: Revisited
From Schneier on Security

Security in 2020: Revisited

Ten years ago, I wrote an essay: "Security in 2020." Well, it's finally 2020. I think I did pretty well. Here's what I said back then: There's really no such thing...

New Ransomware Targets Industrial Control Systems
From Schneier on Security

New Ransomware Targets Industrial Control Systems

EKANS is a new ransomware that targets industrial control systems: But EKANS also uses another trick to ratchet up the pain: It's designed to terminate 64 different...

A New Clue for the Kryptos Sculpture
From Schneier on Security

A New Clue for the Kryptos Sculpture

Jim Sanborn, who designed the Kryptos sculpture in a CIA courtyard, has released another clue to the still-unsolved part 4. I think he's getting tired of waiting...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account