acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorschneier
bg-corner

Jumping Air Gaps with Blinking Lights and Drones
From Schneier on Security

Jumping Air Gaps with Blinking Lights and Drones

Researchers have demonstrated how a malicious piece of software in an air-gapped computer can communicate with a nearby drone using a blinking LED on the computer...

Buzzword Watch: Prosilience
From Schneier on Security

Buzzword Watch: Prosilience

Summer Fowler at CMU has invented a new word: prosilience: I propose that we build operationally PROSILIENT organizations. If operational resilience, as we like...

Botnets
From Schneier on Security

Botnets

Botnets have existed for at least a decade. As early as 2000, hackers were breaking into computers over the Internet and controlling them en masse from centralized...

"Proof Mode" for your Smartphone Camera
From Schneier on Security

"Proof Mode" for your Smartphone Camera

ProofMode is an app for your smartphone that adds data to the photos you take to prove that they are real and unaltered: On the technical front, what the app is...

EU Still Concerned about Windows 10 Privacy Settings
From Schneier on Security

EU Still Concerned about Windows 10 Privacy Settings

We all should be concerned about the privacy settings in Windows 10. And we should be glad that the EU has the regulatory authority to do something about it....

Adm. Rogers Talks about Buying Cyberweapons
From Schneier on Security

Adm. Rogers Talks about Buying Cyberweapons

At a talk last week, the head of US Cyber Command and the NSA Mike Rogers talked about the US buying cyberweapons from arms manufacturers. "In the application of...

A Survey of Propaganda
From Schneier on Security

A Survey of Propaganda

This is an excellent survey article on modern propaganda techniques, how they work, and how we might defend ourselves against them. Cory Doctorow summarizes the...

Friday Squid Blogging: Squid Short Story
From Schneier on Security

Friday Squid Blogging: Squid Short Story

A short SF story in a tweet. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

My TEDMED Talk on Medical Data Privacy
From Schneier on Security

My TEDMED Talk on Medical Data Privacy

Last November, I gave a talk at the TEDMED Conference on health and medical data privacy. The talk is online...

Palantir and the NSA
From Schneier on Security

Palantir and the NSA

The Intercept has a long article on the relationship between Palantir Technologies and the NSA, based on the Snowden documents....

SHA-1 Collision Found
From Schneier on Security

SHA-1 Collision Found

The first collision in the SHA-1 hash function has been found. This is not a surprise. We've all expected this for over a decade, watching computing power increase...

NSA Using Cyberattack for Defense
From Schneier on Security

NSA Using Cyberattack for Defense

These days, it's rare that we learn something new from the Snowden documents. But Ben Buchanan found something interesting. The NSA penetrates enemy networks in...

German Government Classifies Doll as Illegal Spyware
From Schneier on Security

German Government Classifies Doll as Illegal Spyware

This is interesting: The My Friend Cayla doll, which is manufactured by the US company Genesis Toys and distributed in Europe by Guildford-based Vivid Toy Group...

Friday Squid Blogging: The Strawberry Squid's Lopsided Eyes
From Schneier on Security

Friday Squid Blogging: The Strawberry Squid's Lopsided Eyes

The evolutionary reasons why the strawberry squid has two different eyes. Additional articles. Original paper. As usual, you can also use this squid post to talk...

IoT Attack Against a University Network
From Schneier on Security

IoT Attack Against a University Network

Verizon's Data Brief Digest 2017 describes an attack against an unnamed university by attackers who hacked a variety of IoT devices and had them spam network targets...

Duqu Malware Techniques Used by Cybercriminals
From Schneier on Security

Duqu Malware Techniques Used by Cybercriminals

Duqu 2.0 is a really impressive piece of malware, related to Stuxnet and probably written by the NSA. One of its security features is that it stays resident in...

Research into the Root Causes of Terrorism
From Schneier on Security

Research into the Root Causes of Terrorism

Interesting article in Science discussing field research on how people are radicalized to become terrorists. The potential for research that can overcome existing...

Survey Data on Americans and Cybersecurity
From Schneier on Security

Survey Data on Americans and Cybersecurity

Pew Research just published their latest research data on Americans and their views on cybersecurity: This survey finds that a majority of Americans have directly...

Hacking Back
From Schneier on Security

Hacking Back

There's a really interesting paper from George Washington University on hacking back: "Into the Gray Zone: The Private Sector and Active Defense against Cyber Threats...

Friday Squid Blogging: Squid Communication through Skin Patterns
From Schneier on Security

Friday Squid Blogging: Squid Communication through Skin Patterns

Interesting research. (Popular article here.) As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.....
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account