acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorschneier
bg-corner

Russia is Banning Telegram
From Schneier on Security

Russia is Banning Telegram

Russia has banned the secure messaging app Telegram. It's making an absolute mess of the ban -- blocking 16 million IP addresses, many belonging to the Amazon and...

Yet Another Biometric: Ear Shape
From Schneier on Security

Yet Another Biometric: Ear Shape

This acoustic technology identifies individuals by their ear shapes. No information about either false positives or false negatives....

Friday Squid Blogging: Squid Prices Rise as Catch Decreases
From Schneier on Security

Friday Squid Blogging: Squid Prices Rise as Catch Decreases

In Japan: Last year's haul sank 15% to 53,000 tons, according to the JF Zengyoren national federation of fishing cooperatives. The squid catch has fallen by half...

Securing Elections
From Schneier on Security

Securing Elections

Elections serve two purposes. The first, and obvious, purpose is to accurately choose the winner. But the second is equally important: to convince the loser. To...

Lifting a Fingerprint from a Photo
From Schneier on Security

Lifting a Fingerprint from a Photo

Police in the UK were able to read a fingerprint from a photo of a hand: Staff from the unit's specialist imaging team were able to enhance a picture of a hand...

Oblivious DNS
From Schneier on Security

Oblivious DNS

Interesting idea: ...we present Oblivious DNS (ODNS), which is a new design of the DNS ecosystem that allows current DNS servers to remain unchanged and increases...

Hijacking Emergency Sirens
From Schneier on Security

Hijacking Emergency Sirens

Turns out it's easy to hijack emergency sirens with a radio transmitter....

The DMCA and its Chilling Effects on Research
From Schneier on Security

The DMCA and its Chilling Effects on Research

The Center for Democracy and Technology has a good summary of the current state of the DMCA's chilling effects on security research. To underline the nature of...

Friday Squid Blogging: Eating Firefly Squid
From Schneier on Security

Friday Squid Blogging: Eating Firefly Squid

In Tokama, Japan, you can watch the firefly squid catch and eat them in various ways: "It's great to eat hotaruika around when the seasons change, which is when...

COPPA Compliance
From Schneier on Security

COPPA Compliance

Interesting research: "'Won't Somebody Think of the Children?' Examining COPPA Compliance at Scale": Abstract: We present a scalable dynamic analysis framework...

Cybersecurity Insurance
From Schneier on Security

Cybersecurity Insurance

Good article about how difficult it is to insure an organization against Internet attacks, and how expensive the insurance is. Companies like retailers, banks,...

The Digital Security Exchange Is Live
From Schneier on Security

The Digital Security Exchange Is Live

Last year I wrote about the Digital Security Exchange. The project is live: The DSX works to strengthen the digital resilience of U.S. civil society groups by improving...

DARPA Funding in AI-Assisted Cybersecurity
From Schneier on Security

DARPA Funding in AI-Assisted Cybersecurity

DARPA is launching a program aimed at vulnerability discovery via human-assisted AI. The new DARPA program is called CHESS (Computers and Humans Exploring Software...

Obscure E-Mail Vulnerability
From Schneier on Security

Obscure E-Mail Vulnerability

This vulnerability is a result of an interaction between two different ways of handling e-mail addresses. Gmail ignores dots in addresses, so bruce.schneier@gmail...

Friday Squid Blogging: Sake Decanters Made of Dried Squid
From Schneier on Security

Friday Squid Blogging: Sake Decanters Made of Dried Squid

This is interesting. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines...

Subverting Backdoored Encrryption
From Schneier on Security

Subverting Backdoored Encrryption

This is a really interesting research result. This paper proves that two parties can create a secure communications cannel using a communications system with a...

Public Hearing on IoT Risks
From Schneier on Security

Public Hearing on IoT Risks

The US Consumer Product Safety Commission is holding hearings on IoT risks: The U.S. Consumer Product Safety Commission (CPSC, Commission, or we) will conduct a...

Musical Ciphers
From Schneier on Security

Musical Ciphers

Interesting history....

Friday Squid Blogging: Market Squid in Alaskan Waters
From Schneier on Security

Friday Squid Blogging: Market Squid in Alaskan Waters

Rising sea temperatures is causing market squid to move north into Alaskan waters. As usual, you can also use this squid post to talk about the security stories...

Unlocking iPhones with Dead People's Fingerprints
From Schneier on Security

Unlocking iPhones with Dead People's Fingerprints

It's routine for US police to unlock iPhones with the fingerprints of dead people. It seems only to work with recently dead people....
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account