acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorschneier
bg-corner

Many of My E-Books for Cheap
From Schneier on Security

Many of My E-Books for Cheap

Humble Bundle is selling a bunch of cybersecurity books very cheaply. You can get copies of Applied Cryptography, Secrets and Lies, and Cryptography Engineering...

Australia Considering New Law Weakening Encryption
From Schneier on Security

Australia Considering New Law Weakening Encryption

News from Australia: Under the law, internet companies would have the same obligations telephone companies do to help law enforcement agencies, Prime Minister Malcolm...

Friday Squid Blogging: Eyeball Collector Wants a Giant-Squid Eyeball
From Schneier on Security

Friday Squid Blogging: Eyeball Collector Wants a Giant-Squid Eyeball

They're rare: The one Dubielzig really wants is an eye from a giant squid, which has the biggest eye of any living animal -- it's the size of a dinner plate. "But...

Book Review: Twitter and Tear Gas, by Zeynep Tufekci
From Schneier on Security

Book Review: Twitter and Tear Gas, by Zeynep Tufekci

There are two opposing models of how the Internet has changed protest movements. The first is that the Internet has made protesters mightier than ever. This comes...

Forged Documents and Microsoft Fonts
From Schneier on Security

Forged Documents and Microsoft Fonts

A set of documents in Pakistan were detected as forgeries because their fonts were not in circulation at the time the documents were dated....

Tomato-Plant Security
From Schneier on Security

Tomato-Plant Security

I have a soft spot for interesting biological security measures, especially by plants. I've used them as examples in several of my books. Here's a new one: when...

More on the NSA's Use of Traffic Shaping
From Schneier on Security

More on the NSA's Use of Traffic Shaping

"Traffic shaping" -- the practice of tricking data to flow through a particular route on the Internet so it can be more easily surveiled -- is an NSA technique...

Hacking Spotify
From Schneier on Security

Hacking Spotify

Some of the ways artists are hacking the music-streaming service Spotify....

The Future of Forgeries
From Schneier on Security

The Future of Forgeries

This article argues that AI technologies will make image, audio, and video forgeries much easier in the future. Combined, the trajectory of cheap, high-quality...

Friday Squid Blogging: Why It's Hard to Track the Squid Population
From Schneier on Security

Friday Squid Blogging: Why It's Hard to Track the Squid Population

Counting squid is not easy. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting...

An Assassin's Teapot
From Schneier on Security

An Assassin's Teapot

This teapot has two chambers. Liquid is released from one or the other depending on whether an air hole is covered. I want one....

DNI Wants Research into Secure Multiparty Computation
From Schneier on Security

DNI Wants Research into Secure Multiparty Computation

The Intelligence Advanced Research Projects Activity (IARPA) is soliciting proposals for research projects in secure multiparty computation: Specifically of interest...

Now It's Easier than Ever to Steal Someone's Keys
From Schneier on Security

Now It's Easier than Ever to Steal Someone's Keys

The website key.me will make a duplicate key from a digital photo. If a friend or coworker leaves their keys unattended for a few seconds, you know what to do.....

Dubai Deploying Autonomous Robotic Police Cars
From Schneier on Security

Dubai Deploying Autonomous Robotic Police Cars

It's hard to tell how much of this story is real and how much is aspirational, but it really is only a matter of time: About the size of a child's electric toy...

Commentary on US Election Security
From Schneier on Security

Commentary on US Election Security

Good commentaries from Ed Felten and Matt Blaze. Both make a point that I have also been saying: hacks can undermine the legitimacy of an election, even if there...

GoldenEye Malware
From Schneier on Security

GoldenEye Malware

I don't have anything to say -- mostly because I'm otherwise busy -- about the malware known as GoldenEye, NotPetya, or ExPetr. But I wanted a post to park links...

A Man-in-the-Middle Attack against a Password Reset System
From Schneier on Security

A Man-in-the-Middle Attack against a Password Reset System

This is nice work: "The Password Reset MitM Attack," by Nethanel Gelerntor, Senia Kalma, Bar Magnezi, and Hen Porcilan: Abstract: We present the password reset...

Food Supplier Passes Squid Off as Octopus
From Schneier on Security

Food Supplier Passes Squid Off as Octopus

According to a lawsuit (main article behind paywall), "a Miami-based food vendor and its supplier have been misrepresenting their squid as octopus in an effort...

Details from the 2017 Workshop on Economics and Information Security
From Schneier on Security

Details from the 2017 Workshop on Economics and Information Security

The 16th Workshop on Economics and Information Security was this week. Ross Anderson liveblogged the talks....

Good Article About Google's Project Zero
From Schneier on Security

Good Article About Google's Project Zero

Fortune magazine just published a good article about Google's Project Zero, which finds and publishes exploits in other companies' software products. I have mixed...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account