acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorschneier
bg-corner

Using Intel's SGX to Attack Itself
From Schneier on Security

Using Intel's SGX to Attack Itself

Researchers have demonstrated using Intel's Software Guard Extensions to hide malware and steal cryptographic keys from inside SGX's protected enclave: Malware...

IoT Teddy Bear Leaked Personal Audio Recordings
From Schneier on Security

IoT Teddy Bear Leaked Personal Audio Recordings

CloudPets are an Internet-connected stuffed animals that allow children and parents to send each other voice messages. Last week, we learned that Spiral Toys had...

France Abandons Plans for Internet Voting
From Schneier on Security

France Abandons Plans for Internet Voting

Some good election security news for a change: France is dropping its plans for remote Internet voting, because it's concerned about hacking....

Digital Security Exchange: Security for High-Risk Communities
From Schneier on Security

Digital Security Exchange: Security for High-Risk Communities

I am part of this very interesting project: For many users, blog posts on how to install Signal, massive guides to protecting your digital privacy, and broad statements...

Ransomware for Sale
From Schneier on Security

Ransomware for Sale

Brian Krebs posts a video advertisement for Philadelphia, a ransomware package that you can purchase....

The CIA's "Development Tradecraft DOs and DON'Ts"
From Schneier on Security

The CIA's "Development Tradecraft DOs and DON'Ts"

Useful best practices for malware writers, courtesy of the CIA. Seems like a lot of good advice. General: DO obfuscate or encrypt all strings and configuration...

FBI's Exploit Against Tor
From Schneier on Security

FBI's Exploit Against Tor

The Department of Justice is dropping all charges in a child-porn case rather than release the details of a hack against Tor....

Friday Squid Blogging: Squid Cooking Techniques
From Schneier on Security

Friday Squid Blogging: Squid Cooking Techniques

Here are some squid cooking tips. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Podcast Interview with Me
From Schneier on Security

Podcast Interview with Me

Here's a video interview I did at RSA on the Internet of Things and security....

Defense Against Doxing
From Schneier on Security

Defense Against Doxing

A decade ago, I wrote about the death of ephemeral conversation. As computers were becoming ubiquitous, some unintended changes happened, too. Before computers,...

Google Discloses Details of an Unpatched Microsoft Vulnerability
From Schneier on Security

Google Discloses Details of an Unpatched Microsoft Vulnerability

Google's Project Zero is serious about releasing the details of security vulnerabilities 90 days after they alert the vendors, even if they're unpatched. It just...

More on the CIA Document Leak
From Schneier on Security

More on the CIA Document Leak

If I had to guess right now, I'd say the documents came from an outsider and not an insider. My reasoning: One, there is absolutely nothing illegal in the contents...

The US Has Been Conducting Offensive Cyberattacks against North Korea
From Schneier on Security

The US Has Been Conducting Offensive Cyberattacks against North Korea

The New York Times is reporting that the US has been conducting offensive cyberattacks against North Korea, in an effort to delay its nuclear weapons program......

WikiLeaks Releases CIA Hacking Tools
From Schneier on Security

WikiLeaks Releases CIA Hacking Tools

WikiLeaks just released a cache of 8,761 classified CIA documents from 2012 to 2016, including details of its offensive Internet operations. I have not read through...

Building Smarter Ransomware
From Schneier on Security

Building Smarter Ransomware

Matthew Green and students speculate on what truly well-designed ransomware system could look like: Most modern ransomware employs a cryptocurrency like Bitcoin...

Howard Schmidt
From Schneier on Security

Howard Schmidt

Longtime Internet security-policy pioneer Howard Schmidt died on Friday. He will be missed....

Uber Uses Ubiquitous Surveillance to Identify and Block Regulators
From Schneier on Security

Uber Uses Ubiquitous Surveillance to Identify and Block Regulators

The New York Times reports that Uber developed apps that identified and blocked government regulators using the app to find evidence of illegal behavior: Yet using...

Friday Squid Blogging: When Squid Evolved
From Schneier on Security

Friday Squid Blogging: When Squid Evolved

Squid evolved during an "evolutionary war" -- the Mesozoic Marine Revolution -- about 100 million years ago. Research paper. As usual, you can also use this squid...

Me at the RSA Conference
From Schneier on Security

Me at the RSA Conference

This is my talk at the RSA Conference last month. It's on regulation and the Internet of Things, along the lines of this essay. I am slowly meandering around this...

Hacking Marconi's Wireless in 1903
From Schneier on Security

Hacking Marconi's Wireless in 1903

A delightful story....
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account