acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorschneier
bg-corner

CSIS's Cybersecurity Agenda
From Schneier on Security

CSIS's Cybersecurity Agenda

The Center for Strategic and International Studies (CSIS) published "From Awareness to Action: A Cybersecurity Agenda for the 45th President" (press release here)...

De-Anonymizing Browser History Using Social-Network Data
From Schneier on Security

De-Anonymizing Browser History Using Social-Network Data

Interesting research: "De-anonymizing Web Browsing Data with Social Networks": Abstract: Can online trackers and network adversaries de-anonymize web browsing data...

Security and Privacy Guidelines for the Internet of Things
From Schneier on Security

Security and Privacy Guidelines for the Internet of Things

Lately, I have been collecting IoT security and privacy guidelines. Here's everything I've found: "Internet of Things (IoT) Broadband Internet Technical Advisory...

Do-It-Yourself Online Privacy/Safety Guide
From Schneier on Security

Do-It-Yourself Online Privacy/Safety Guide

This online safety guide was written for people concerned about being tracked and stalked online. It's a good resource....

Predicting a Slot Machine's PRNG
From Schneier on Security

Predicting a Slot Machine's PRNG

Wired is reporting on a new slot machine hack. A Russian group has reverse-engineered a particular brand of slot machine -- from Austrian company Novomatic -- and...

Profile of Citizen Lab and Ron Diebert
From Schneier on Security

Profile of Citizen Lab and Ron Diebert

Here's a nice profile of Citizen Lab and its director, Ron Diebert. Citizen Lab is a jewel. There should be more of them....

Cryptkeeper Bug
From Schneier on Security

Cryptkeeper Bug

The Linux encryption app Cryptkeeper has a rather stunning security bug: the single-character decryption key "p" decrypts everything: The flawed version is in Debian...

Hacker Leaks Cellebrite's Phone-Hacking Tools
From Schneier on Security

Hacker Leaks Cellebrite's Phone-Hacking Tools

In January we learned that a hacker broke into Cellebrite's network and stole 900GB of data. Now the hacker has dumped some of Cellebrite's phone-hacking tools...

Friday Squid Blogging: Whale Mistakes Plastic Bags for Squid
From Schneier on Security

Friday Squid Blogging: Whale Mistakes Plastic Bags for Squid

A whale recently died in Norway because there were thirty plastic bags in its stomach. Researchers believe it may have mistaken the plastic bags for squid. As usual...

How the US Secret Service Breaks into Smart Phones
From Schneier on Security

How the US Secret Service Breaks into Smart Phones

Here's an article about the US Secret Service and their Cell Phone Forensics Facility in Tulsa. I said it before and I'll say it again: the FBI needs technical...

Pacemaker Data Used in Arson Conviction
From Schneier on Security

Pacemaker Data Used in Arson Conviction

Here's a story about data from a pacemaker being used as evidence in an arson conviction....

Security and the Internet of Things
From Schneier on Security

Security and the Internet of Things

Last year, on October 21, your digital video recorder ­- or at least a DVR like yours ­- knocked Twitter off the internet. Someone used your DVR, along with millions...

IoT Ransomware Against Austrian Hotel
From Schneier on Security

IoT Ransomware Against Austrian Hotel

Attackers held an Austrian hotel network for ransom, demanding $1800 in Bitcoin to unlock the network. Among other things, the locked network wouldn't allow any...

New Rules on Data Privacy for Non-US Citizens
From Schneier on Security

New Rules on Data Privacy for Non-US Citizens

Last week, President Trump signed an executive order affecting the privacy rights of non-US citizens with respect to data residing in the US. Here's the relevant...

Friday Squid Blogging: Squid Fossils from the Early Jurassic
From Schneier on Security

Friday Squid Blogging: Squid Fossils from the Early Jurassic

New fossil bed discovered in Alberta: The finds at the site include 16 vampyropods, a relative of the vampire squid with its ink sac and fine details of its muscles...

Research into Twitter Bots
From Schneier on Security

Research into Twitter Bots

There are a lot of them. In a world where the number of fans, friends, followers, and likers are social currency -- and where the number of reposts is a measure...

Duress Codes for Fingerprint Access Control
From Schneier on Security

Duress Codes for Fingerprint Access Control

Mike Specter has an interesting idea on how to make biometric access-control systems more secure: add a duress code. For example, you might configure your iPhone...

Security Risks of the President's Android Phone
From Schneier on Security

Security Risks of the President's Android Phone

Reports are that President Trump is still using his old Android phone. There are security risks here, but they are not the obvious ones. I'm not concerned about...

Capturing Pattern-Lock Authentication
From Schneier on Security

Capturing Pattern-Lock Authentication

Interesting research -- "Cracking Android Pattern Lock in Five Attempts": Abstract: Pattern lock is widely used as a mechanism for authentication and authorization...

How the Media Influences Our Fear of Terrorism
From Schneier on Security

How the Media Influences Our Fear of Terrorism

Good article that crunches the data and shows that the press's coverage of terrorism is disproportional to its comparative risk. This isn't new. I've written about...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account