acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorschneier
bg-corner

Mailing Tech Support a Bomb
From Schneier on Security

Mailing Tech Support a Bomb

I understand his frustration, but this is extreme: When police asked Cryptopay what could have motivated Salonen to send the company a pipe bomb ­ or, rather, two...

Hidden Cameras in Streetlights
From Schneier on Security

Hidden Cameras in Streetlights

Both the US Drug Enforcement Administration (DEA) and Immigration and Customs Enforcement (ICE) are hiding surveillance cameras in streetlights. According to government...

Chip Cards Fail to Reduce Credit Card Fraud in the US
From Schneier on Security

Chip Cards Fail to Reduce Credit Card Fraud in the US

A new study finds that credit card fraud has not declined since the introduction of chip cards in the US. The majority of stolen card information comes from hacked...

More Spectre/Meltdown-Like Attacks
From Schneier on Security

More Spectre/Meltdown-Like Attacks

Back in January, we learned about a class of vulnerabilities against microprocessors that leverages various performance and efficiency shortcuts for attack. I wrote...

Upcoming Speaking Engagements
From Schneier on Security

Upcoming Speaking Engagements

This is a current list of where and when I am scheduled to speak: I'm speaking at Kiwicon in Wellington, New Zealand on November 16, 2018. I'm appearing on IBM...

Oracle and "Responsible Disclosure"
From Schneier on Security

Oracle and "Responsible Disclosure"

I've been writing about "responsible disclosure" for over a decade; here's an essay from 2007. Basically, it's a tacit agreement between researchers and software...

New IoT Security Regulations
From Schneier on Security

New IoT Security Regulations

Due to ever-evolving technological advances, manufacturers are connecting consumer goods­ -- from toys to lightbulbs to major appliances­ -- to the internet at...

Hiding Secret Messages in Fingerprints
From Schneier on Security

Hiding Secret Messages in Fingerprints

This is a fun steganographic application: hiding a message in a fingerprint image. Can't see any real use for it, but that's okay....

Friday Squid Blogging: Australian Fisherman Gets Inked
From Schneier on Security

Friday Squid Blogging: Australian Fisherman Gets Inked

Pretty good video. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines...

The Pentagon is Publishing Foreign Nation-State Malware
From Schneier on Security

The Pentagon is Publishing Foreign Nation-State Malware

This is a new thing: The Pentagon has suddenly started uploading malware samples from APTs and other nation-state sources to the website VirusTotal, which is essentially...

Privacy and Security of Data at Universities
From Schneier on Security

Privacy and Security of Data at Universities

Interesting paper: "Open Data, Grey Data, and Stewardship: Universities at the Privacy Frontier," by Christine Borgman: Abstract: As universities recognize the...

iOS 12.1 Vulnerability
From Schneier on Security

iOS 12.1 Vulnerability

This is really just to point out that computer security is really hard: Almost as soon as Apple released iOS 12.1 on Tuesday, a Spanish security researcher discovered...

Consumer Reports Reviews Wireless Home-Security Cameras
From Schneier on Security

Consumer Reports Reviews Wireless Home-Security Cameras

Consumer Reports is starting to evaluate the security of IoT devices. As part of that, it's reviewing wireless home-security cameras. It found significant security...

Security of Solid-State-Drive Encryption
From Schneier on Security

Security of Solid-State-Drive Encryption

Interesting research: "Self-encrypting deception: weaknesses in the encryption of solid state drives (SSDs)": Abstract: We have analyzed the hardware full-disk...

Troy Hunt on Passwords
From Schneier on Security

Troy Hunt on Passwords

Troy Hunt has a good essay about why passwords are here to stay, despite all their security problems: This is why passwords aren't going anywhere in the foreseeable...

Friday Squid Blogging: Eating More Squid
From Schneier on Security

Friday Squid Blogging: Eating More Squid

This research paper concludes that we'll be eating more squid in the future. As usual, you can also use this squid post to talk about the security stories in the...

How to Punish Cybercriminals
From Schneier on Security

How to Punish Cybercriminals

Interesting policy paper by Third Way: "To Catch a Hacker: Toward a comprehensive strategy to identify, pursue, and punish malicious cyber actors": In this paper...

Buying Used Voting Machines on eBay
From Schneier on Security

Buying Used Voting Machines on eBay

This is not surprising: This year, I bought two more machines to see if security had improved. To my dismay, I discovered that the newer model machines -- those...

Was the Triton Malware Attack Russian in Origin?
From Schneier on Security

Was the Triton Malware Attack Russian in Origin?

The conventional story is that Iran targeted Saudi Arabia with Triton in 2017. New research from FireEye indicates that it might have been Russia. I don't know....

ID Systems Throughout the 50 States
From Schneier on Security

ID Systems Throughout the 50 States

Jim Harper at CATO has a good survey of state ID systems in the US....
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account