acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorschneier
bg-corner

Video Surveillance by Computer
From Schneier on Security

Video Surveillance by Computer

The ACLU's Jay Stanley has just published a fantastic report: "The Dawn of Robot Surveillance" (blog post here) Basically, it lays out a future of ubiquitous video...

Report on the Stalkerware Industry
From Schneier on Security

Report on the Stalkerware Industry

Citizen Lab just published an excellent report on the stalkerware industry....

Rock-Paper-Scissors Robot
From Schneier on Security

Rock-Paper-Scissors Robot

How in the world did I not know about this for three years? Researchers at the University of Tokyo have developed a robot that always wins at rock-paper-scissors...

Workshop on the Economics of Information Security
From Schneier on Security

Workshop on the Economics of Information Security

Last week, I hosted the eighteenth Workshop on the Economics of Information Security at Harvard. Ross Anderson liveblogged the talks....

Employment Scam
From Schneier on Security

Employment Scam

Interesting story of an old-school remote-deposit capture fraud scam, wrapped up in a fake employment scam. Slashdot thread....

Friday Squid Blogging: Possible New Squid Species
From Schneier on Security

Friday Squid Blogging: Possible New Squid Species

NOAA video. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here...

iOS Shortcut for Recording the Police
From Schneier on Security

iOS Shortcut for Recording the Police

"Hey Siri; I'm getting pulled over" can be a shortcut: Once the shortcut is installed and configured, you just have to say, for example, "Hey Siri, I'm getting...

Security and Human Behavior (SHB) 2019
From Schneier on Security

Security and Human Behavior (SHB) 2019

Today is the second day of the twelfth Workshop on Security and Human Behavior, which I am hosting at Harvard University. SHB is a small, annual, invitational workshop...

Chinese Military Wants to Develop Custom OS
From Schneier on Security

Chinese Military Wants to Develop Custom OS

Citing security concerns, the Chinese military wants to replace Windows with its own custom operating system: Thanks to the Snowden, Shadow Brokers, and Vault7...

Lessons Learned Trying to Secure Congressional Campaigns
From Schneier on Security

Lessons Learned Trying to Secure Congressional Campaigns

Really interesting first-hand experience from Maciej Cegłowski....

The Cost of Cybercrime
From Schneier on Security

The Cost of Cybercrime

Really interesting paper calculating the worldwide cost of cybercrime: Abstract: In 2012 we presented the first systematic study of the costs of cybercrime. In...

The Importance of Protecting Cybersecurity Whistleblowers
From Schneier on Security

The Importance of Protecting Cybersecurity Whistleblowers

Interesting essay arguing that we need better legislation to protect cybersecurity whistleblowers. Congress should act to protect cybersecurity whistleblowers because...

The Human Cost of Cyberattacks
From Schneier on Security

The Human Cost of Cyberattacks

The International Committee of the Red Cross has just published a report: "The Potential Human Cost of Cyber-Operations." It's the result of an "ICRC Expert Meeting"...

Friday Squid Blogging: Hundred-Million-Year-Old Squid Relative Found in Amber
From Schneier on Security

Friday Squid Blogging: Hundred-Million-Year-Old Squid Relative Found in Amber

This is a really interesting find. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog...

Fraudulent Academic Papers
From Schneier on Security

Fraudulent Academic Papers

The term "fake news" has lost much of its meaning, but it describes a real and dangerous Internet trend. Because it's hard for many people to differentiate a real...

Alex Stamos on Content Moderation and Security
From Schneier on Security

Alex Stamos on Content Moderation and Security

Really interesting talk by former Facebook CISO Alex Stamos about the problems inherent in content moderation by social media platforms. Well worth watching....

First American Financial Corp. Data Records Leak
From Schneier on Security

First American Financial Corp. Data Records Leak

Krebs on Security is reporting a massive data leak by the real estate title insurance company First American Financial Corp. "The title insurance agency collects...

Friday Squid Blogging: More Materials Science from Squid Skin
From Schneier on Security

Friday Squid Blogging: More Materials Science from Squid Skin

Article: "How a Squid's Color-Changing Skin Inspired a New Material That Can Trap or Release Heat." As usual, you can also use this squid post to talk about the...

NSA Hawaii
From Schneier on Security

NSA Hawaii

Recently I've heard Edward Snowden talk about his working at the NSA in Hawaii as being "under a pineapple field." CBS News recently ran a segment on that NSA listening...

Germany Talking about Banning End-to-End Encryption
From Schneier on Security

Germany Talking about Banning End-to-End Encryption

Der Spiegel is reporting that the German Ministry for Internal Affairs is planning to require all Internet message services to provide plaintext messages on demand...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account