acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorschneier
bg-corner

Security Vulnerabilities in the RCS Texting Protocol
From Schneier on Security

Security Vulnerabilities in the RCS Texting Protocol

Interesting research: SRLabs founder Karsten Nohl, a researcher with a track record of exposing security flaws in telephony systems, argues that RCS is in many...

Upcoming Speaking Engagements
From Schneier on Security

Upcoming Speaking Engagements

This is a current list of where and when I am scheduled to speak: I'm speaking at SecIT by Heise in Hannover, Germany on March 26, 2020. The list is maintained...

Friday Squid Blogging: Color-Changing Properties of the Opalescent Inshore Squid
From Schneier on Security

Friday Squid Blogging: Color-Changing Properties of the Opalescent Inshore Squid

Interesting stuff. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines...

EFF on the Mechanics of Corporate Surveillance
From Schneier on Security

EFF on the Mechanics of Corporate Surveillance

EFF has published a comprehensible and very readable "deep dive" into the technologies of corporate surveillance, both on the Internet and off. Well worth reading...

Scaring People into Supporting Backdoors
From Schneier on Security

Scaring People into Supporting Backdoors

Back in 1998, Tim May warned us of the "Four Horsemen of the Infocalypse": "terrorists, pedophiles, drug dealers, and money launderers." I tended to cast it slightly...

Extracting Data from Smartphones
From Schneier on Security

Extracting Data from Smartphones

Privacy International has published a detailed, technical examination of how data is extracted from smartphones....

Reforming CDA 230
From Schneier on Security

Reforming CDA 230

There's a serous debate on reforming Section 230 of the Communications Decency Act. I am in the process of figuring out what I believe, and this is more a place...

Failure Modes in Machine Learning
From Schneier on Security

Failure Modes in Machine Learning

Interesting taxonomy of machine-learning failures (pdf) that encompasses both mistakes and attacks, or -- in their words -- intentional and unintentional failure...

Friday Squid Blogging: Squidfall Safety
From Schneier on Security

Friday Squid Blogging: Squidfall Safety

Watchmen supporting material. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting...

Andy Ellis on Risk Assessment
From Schneier on Security

Andy Ellis on Risk Assessment

Andy Ellis, the CSO of Akamai, gave a great talk about the psychology of risk at the Business of Software conference this year. I've written about this before....

Election Machine Insecurity Story
From Schneier on Security

Election Machine Insecurity Story

Interesting story of a flawed computer voting machine and a paper ballot available for recount. All ended well, but only because of that paper backup. Vote totals...

Becoming a Tech Policy Activist
From Schneier on Security

Becoming a Tech Policy Activist

Carolyn McCarthy gave an excellent TEDx talk about becoming a tech policy activist. It's a powerful call for public-interest technologists....

RSA-240 Factored
From Schneier on Security

RSA-240 Factored

This just in: We are pleased to announce the factorization of RSA-240, from RSA's challenge list, and the computation of a discrete logarithm of the same size (795...

The Story of Tiversa
From Schneier on Security

The Story of Tiversa

The New Yorker has published the long and interesting story of the cybersecurity firm Tiversa. Watching "60 Minutes," Boback saw a remarkable new business angle...

Cameras that Automatically Detect Mobile Phone Use
From Schneier on Security

Cameras that Automatically Detect Mobile Phone Use

New South Wales is implementing a camera system that automatically detects when a driver is using a mobile phone....

Friday Squid Blogging: Squid-Like Underwater Drone
From Schneier on Security

Friday Squid Blogging: Squid-Like Underwater Drone

The Sea Hunting Autonomous Reconnaissance Drone (SHARD) swims like a squid and can explode on command. As usual, you can also use this squid post to talk about...

Manipulating Machine Learning Systems by Manipulating Training Data
From Schneier on Security

Manipulating Machine Learning Systems by Manipulating Training Data

Interesting research: "TrojDRL: Trojan Attacks on Deep Reinforcement Learning Agents": Abstract:: Recent work has identified that classification models implemented...

DHS Mandates Federal Agencies to Run Vulnerability Disclosure Policy
From Schneier on Security

DHS Mandates Federal Agencies to Run Vulnerability Disclosure Policy

The DHS is requiring all federal agencies to develop a vulnerability disclosure policy. The goal is that people who discover vulnerabilities in government systems...

Friday Squid Blogging: T-Shirt
From Schneier on Security

Friday Squid Blogging: T-Shirt

"Squid Pro Quo" T-shirt. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting...

The NSA Warns of TLS Inspection
From Schneier on Security

The NSA Warns of TLS Inspection

The NSA has released a security advisory warning of the dangers of TLS inspection: Transport Layer Security Inspection (TLSI), also known as TLS break and inspect...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account