acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorschneier
bg-corner

ICT Supply-Chain Security
From Schneier on Security

ICT Supply-Chain Security

The Carnegie Endowment for Peace published a comprehensive report on ICT (information and communication technologies) supply-chain security and integrity. It's...

Former FBI General Counsel Jim Baker Chooses Encryption Over Backdoors
From Schneier on Security

Former FBI General Counsel Jim Baker Chooses Encryption Over Backdoors

In an extraordinary essay, the former FBI general counsel Jim Baker makes the case for strong encryption over government-mandated backdoors: In the face of congressional...

Friday Squid Blogging: Researchers Investigating Using Squid Propulsion for Underwater Robots
From Schneier on Security

Friday Squid Blogging: Researchers Investigating Using Squid Propulsion for Underwater Robots

Interesting article and paper. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting...

Dark Web Site Taken Down without Breaking Encryption
From Schneier on Security

Dark Web Site Taken Down without Breaking Encryption

The US Department of Justice unraveled a dark web child-porn website, leading to the arrest of 337 people in at least 18 countries. This was all accomplished not...

Mapping Security and Privacy Research across the Decades
From Schneier on Security

Mapping Security and Privacy Research across the Decades

This is really interesting: "A Data-Driven Reflection on 36 Years of Security and Privacy Research," by Aniqua Baset and Tamara Denning: Abstract: Meta-research...

NordVPN Breached
From Schneier on Security

NordVPN Breached

There was a successful attack against NordVPN: Based on the command log, another of the leaked secret keys appeared to secure a private certificate authority that...

Public Voice Launches Petition for an International Moratorium on Using Facial Recognition for Mass Surveillance
From Schneier on Security

Public Voice Launches Petition for an International Moratorium on Using Facial Recognition for Mass Surveillance

Coming out of the Privacy Commissioners' Conference in Albania, Public Voice is launching a petition for an international moratorium on using facial recognition...

Calculating the Benefits of the Advanced Encryption Standard
From Schneier on Security

Calculating the Benefits of the Advanced Encryption Standard

NIST has completed a study -- it was published last year, but I just saw it recently -- calculating the costs and benefits of the Advanced Encryption Standard....

Details of the Olympic Destroyer APT
From Schneier on Security

Details of the Olympic Destroyer APT

Interesting details on Olympic Destroyer, the nation-state cyberattack against the 2018 Winter Olympic Games in South Korea. Wired's Andy Greenberg presents evidence...

Friday Squid Blogging: Six-Foot-Long Mass of Squid Eggs Found on Great Barrier Reef
From Schneier on Security

Friday Squid Blogging: Six-Foot-Long Mass of Squid Eggs Found on Great Barrier Reef

It's likely the diamondback squid. There's a video. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered...

Why Technologists Need to Get Involved in Public Policy
From Schneier on Security

Why Technologists Need to Get Involved in Public Policy

Last month, I gave a 15-minute talk in London titled: "Why technologists need to get involved in public policy." In it, I try to make the case for public-interest...

Adding a Hardware Backdoor to a Networked Computer
From Schneier on Security

Adding a Hardware Backdoor to a Networked Computer

Interesting proof of concept: At the CS3sthlm security conference later this month, security researcher Monta Elkins will show how he created a proof-of-concept...

Using Machine Learning to Detect IP Hijacking
From Schneier on Security

Using Machine Learning to Detect IP Hijacking

This is interesting research: In a BGP hijack, a malicious actor convinces nearby networks that the best path to reach a specific IP address is through their network...

Cracking the Passwords of Early Internet Pioneers
From Schneier on Security

Cracking the Passwords of Early Internet Pioneers

Lots of them weren't very good: BSD co-inventor Dennis Ritchie, for instance, used "dmac" (his middle name was MacAlistair); Stephen R. Bourne, creator of the Bourne...

Factoring 2048-bit Numbers Using 20 Million Qubits
From Schneier on Security

Factoring 2048-bit Numbers Using 20 Million Qubits

This theoretical paper shows how to factor 2048-bit RSA moduli with a 20-million qubit quantum computer in eight hours. It's interesting work, but I don't want...

Friday Squid Blogging: Apple Fixes Squid Emoji
From Schneier on Security

Friday Squid Blogging: Apple Fixes Squid Emoji

Apple fixed the squid emoji in iOS 13.1: A squid's siphon helps it move, breathe, and discharge waste, so having the siphon in back makes more sense than having...

I Have a New Book: We Have Root
From Schneier on Security

I Have a New Book: We Have Root

I just published my third collection of essays: We Have Root. This book covers essays from 2013 to 2017. (The first two are Schneier on Security and Carry On.)...

Details on Uzbekistan Government Malware: SandCat
From Schneier on Security

Details on Uzbekistan Government Malware: SandCat

Kaspersky has uncovered an Uzbeki hacking operation, mostly due to incompetence on the part of the government hackers. The group's lax operational security includes...

New Reductor Nation-State Malware Compromises TLS
From Schneier on Security

New Reductor Nation-State Malware Compromises TLS

Kaspersky has a detailed blog post about a new piece of sophisticated malware that it's calling Reductor. The malware is able to compromise TLS traffic by infecting...

Wi-Fi Hotspot Tracking
From Schneier on Security

Wi-Fi Hotspot Tracking

Free Wi-Fi hotspots can track your location, even if you don't connect to them. This is because your phone or computer broadcasts a unique MAC address. What distinguishes...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account