acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
datePast Month
authorBruce Schneier
bg-corner

Friday Squid Blogging: Squid-Inspired Hydrogel
From Schneier on Security

Friday Squid Blogging: Squid-Inspired Hydrogel

Scientists have created a hydrogel “using squid mantle and creative chemistry.” As usual, you can also use this squid post to talk about the security stories in...

Kevin Mitnick Hacked California Law in 1983
From Schneier on Security

Kevin Mitnick Hacked California Law in 1983

Early in his career, Kevin Mitnick successfully hacked California law. He told me the story when he heard about my new book, which he partially recounts his 2012...

A Guide to Phishing Attacks
From Schneier on Security

A Guide to Phishing Attacks

This is a good list of modern phishing techniques.

US Cyber Command Operations During the 2022 Midterm Elections
From Schneier on Security

US Cyber Command Operations During the 2022 Midterm Elections

The head of both US Cyber Command and the NSA, Gen. Paul Nakasone, broadly discussed that first organization’s offensive cyber operations during the runup to the...

Bulk Surveillance of Money Transfers
From Schneier on Security

Bulk Surveillance of Money Transfers

Just another obscure warrantless surveillance program. US law enforcement can access details of money transfers without a warrant through an obscure surveillance...

No-Fly List Exposed
From Schneier on Security

No-Fly List Exposed

I can’t remember the last time I thought about the US no-fly list: the list of people so dangerous they should never be allowed to fly on an airplane, yet so innocent...

Friday Squid Blogging: Another Giant Squid Captured on Video
From Schneier on Security

Friday Squid Blogging: Another Giant Squid Captured on Video

Here’s a new video of a giant squid, filmed in the Sea of Japan. I believe it’s injured. It’s so close to the surface, and not really moving very much. “We didn...

Real-World Steganography
From Schneier on Security

Real-World Steganography

From an article about Zheng Xiaoqing, an American convicted of spying for China: According to a Department of Justice (DOJ) indictment, the US citizen hid confidential...

Security Analysis of Threema
From Schneier on Security

Security Analysis of Threema

A group of Swiss researchers have published an impressive security analysis of Threema. We provide an extensive cryptographic analysis of Threema, a Swiss-based...

AI and Political Lobbying
From Schneier on Security

AI and Political Lobbying

Launched just weeks ago, ChatGPT is already threatening to upend how we draft everyday communications like emails, college essays and myriad other forms of writing...

The FBI Identified a Tor User
From Schneier on Security

The FBI Identified a Tor User

No details, though: According to the complaint against him, Al-Azhari allegedly visited a dark web site that hosts “unofficial propaganda and photographs related...

Hacked Cellebrite and MSAB Software Released
From Schneier on Security

Hacked Cellebrite and MSAB Software Released

Cellebrite is an cyberweapons arms manufacturer that sells smartphone forensic software to governments around the world. MSAB is a Swedish company that does the...

Friday Squid Blogging: How to Buy Fresh or Frozen Squid
From Schneier on Security

Friday Squid Blogging: How to Buy Fresh or Frozen Squid

Good advice on buying squid. I like to buy whole fresh squid and clean it myself. As usual, you can also use this squid post to talk about the security storieshere...

Threats of Machine-Generated Text
From Schneier on Security

Threats of Machine-Generated Text

With the release of ChatGPT, I’ve read many random articles about this or that threat from the technology. This paper is a good survey of the field: what the threats...

Experian Privacy Vulnerability
From Schneier on Security

Experian Privacy Vulnerability

Brian Krebs is reporting on a vulnerability in Experian’s website: Identity thieves have been exploiting a glaring security weakness in the website of Experian,...

ChatGPT-Written Malware
From Schneier on Security

ChatGPT-Written Malware

I don’t know how much of a thing this will end up being, but we are seeing ChatGPT-written malware in the wild. …within a few weeks of ChatGPT going live, participants...

Identifying People Using Cell Phone Location Data
From Schneier on Security

Identifying People Using Cell Phone Location Data

The two people who shut down four Washington power stations in December were arrested. This is the interesting part: Investigators identified Greenwood and Crahan...

Friday Squid Blogging: Squid Fetish
From Schneier on Security

Friday Squid Blogging: Squid Fetish

Seems that about 1.5% of people have a squid fetish. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered...

Schneier on Security Audiobook Sale
From Schneier on Security

Schneier on Security Audiobook Sale

I’m not sure why, but Audiobooks.com is offering the audiobook version of Schneier on Security at 50% off until January 17.

Remote Vulnerabilities in Automobiles
From Schneier on Security

Remote Vulnerabilities in Automobiles

This group has found a ton of remote vulnerabilities in all sorts of automobiles. It’s enough to make you want to buy a car that is not Internet-connected. Unfortunately...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account