acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorschneier
bg-corner

The US National Cyber Strategy
From Schneier on Security

The US National Cyber Strategy

Last month the White House released the "National Cyber Strategy of the United States of America. I generally don't have much to say about these sorts of documents...

Defeating the "Deal or No Deal" Arcade Game
From Schneier on Security

Defeating the "Deal or No Deal" Arcade Game

Two teenagers figured out how to beat the "Deal or No Deal" arcade game by filming the computer animation than then slowing it down enough to determine where the...

Friday Squid Blogging: Watch Squid Change Colors
From Schneier on Security

Friday Squid Blogging: Watch Squid Change Colors

This is an amazing short video of a squid -- I don't know the species -- changing its color instantly. As usual, you can also use this squid post to talk about...

Detecting Credit Card Skimmers
From Schneier on Security

Detecting Credit Card Skimmers

Interesting research paper: "Fear the Reaper: Characterization and Fast Detection of Card Skimmers": Abstract: Payment card fraud results in billions of dollars...

Conspiracy Theories Around the "Presidential Alert"
From Schneier on Security

Conspiracy Theories Around the "Presidential Alert"

Noted conspiracy theorist John McAfee tweeted: The "Presidential alerts": they are capable of accessing the E911 chip in your phones - giving them full access to...

Chinese Supply Chain Hardware Attack
From Schneier on Security

Chinese Supply Chain Hardware Attack

Bloomberg is reporting about a Chinese espionage operating involving inserting a tiny chip into computer products made in China. I've written (alternate link) this...

Helen Nissenbaum on Data Privacy and Consent
From Schneier on Security

Helen Nissenbaum on Data Privacy and Consent

This is a fantastic Q&A with NYU Law Professor Helen Nissenbaum on data privacy and why it's wrong to focus on consent. I'm not going to pull a quote, because you...

The Effects of GDPR's 72-Hour Notification Rule
From Schneier on Security

The Effects of GDPR's 72-Hour Notification Rule

The EU's GDPR regulation requires companies to report a breach within 72 hours. Alex Stamos, former Facebook CISO now at Stanford University, points out how this...

Terahertz Millimeter-Wave Scanners
From Schneier on Security

Terahertz Millimeter-Wave Scanners

Interesting article on terahertz millimeter-wave scanners and their uses to detect terrorist bombers. The heart of the device is a block of electronics about the...

Sophisticated Voice Phishing Scams
From Schneier on Security

Sophisticated Voice Phishing Scams

Brian Krebs is reporting on some new and sophisticated phishing scams over the telephone. I second his advice: "never give out any information about yourself in...

Facebook Is Using Your Two-Factor Authentication Phone Number to Target Advertising
From Schneier on Security

Facebook Is Using Your Two-Factor Authentication Phone Number to Target Advertising

From Kashmir Hill: Facebook is not content to use the contact information you willingly put into your Facebook profile for advertising. It is also using contact...

More on the Five Eyes Statement on Encryption and Backdoors
From Schneier on Security

More on the Five Eyes Statement on Encryption and Backdoors

Earlier this month, I wrote about a statement by the Five Eyes countries about encryption and back doors. (Short summary: they like them.) One of the weird things...

Friday Squid Blogging: Squid Protein Used in Variable Thermal Conductivity Material
From Schneier on Security

Friday Squid Blogging: Squid Protein Used in Variable Thermal Conductivity Material

This is really neat. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines...

Major Tech Companies Finally Endorse Federal Privacy Regulation
From Schneier on Security

Major Tech Companies Finally Endorse Federal Privacy Regulation

The major tech companies, scared that states like California might impose actual privacy regulations, have now decided that they can better lobby the federal government...

Yet Another IoT Cybersecurity Document
From Schneier on Security

Yet Another IoT Cybersecurity Document

This one is from NIST: "Considerations for Managing Internet of Things (IoT) Cybersecurity and Privacy Risks." It's still in draft. Remember, there are many others...

Counting People Through a Wall with WiFi
From Schneier on Security

Counting People Through a Wall with WiFi

Interesting research: In the team's experiments, one WiFi transmitter and one WiFi receiver are behind walls, outside a room in which a number of people are present...

Evidence for the Security of PKCS #1 Digital Signatures
From Schneier on Security

Evidence for the Security of PKCS #1 Digital Signatures

This is interesting research: "On the Security of the PKCS#1 v1.5 Signature Scheme": Abstract: The RSA PKCS#1 v1.5 signature algorithm is the most widely used digital...

New Variants of Cold-Boot Attack
From Schneier on Security

New Variants of Cold-Boot Attack

If someone has physical access to your shut-down computer, they can probably break the hard-drive's encryption. This is a "cold boot" attack, and one we thought...

Friday Squid Blogging: British Columbia "Squid Run" Is a Tourist Attraction
From Schneier on Security

Friday Squid Blogging: British Columbia "Squid Run" Is a Tourist Attraction

On James Island. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines...

New Findings About Prime Number Distribution Almost Certainly Irrelevant to Cryptography
From Schneier on Security

New Findings About Prime Number Distribution Almost Certainly Irrelevant to Cryptography

Lots of people are e-mailing me about this new result on the distribution of prime numbers. While interesting, it has nothing to do with cryptography. Cryptographers...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account