acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
datePast Year
authorBruce Schneier
bg-corner

Apps That Are Spying on Your Location
From Schneier on Security

Apps That Are Spying on Your Location

404 Media is reporting on all the apps that are spying on your location, based on a hack of the location data company Gravy Analytics: The thousands of apps, included...

Zero-Day Vulnerability in Ivanti VPN
From Schneier on Security

Zero-Day Vulnerability in Ivanti VPN

It’s being actively exploited.

US Treasury Department Sanctions Chinese Company Over Cyberattacks
From Schneier on Security

US Treasury Department Sanctions Chinese Company Over Cyberattacks

From the Washington Post: The sanctions target Beijing Integrity Technology Group, which U.S. officials say employed workers responsible for the Flax Typhoon attacks...

Friday Squid Blogging: Anniversary Post
From Schneier on Security

Friday Squid Blogging: Anniversary Post

I made my first squid post nineteen years ago this week. Between then and now, I posted something about squid every week (with maybe only a few exceptions). There...

ShredOS
From Schneier on Security

ShredOS

ShredOS is a stripped-down operating system designed to destroy data. GitHub page here.

Google Is Allowing Device Fingerprinting
From Schneier on Security

Google Is Allowing Device Fingerprinting

Lukasz Olejnik writes about device fingerprinting, and why Google’s policy change to allow it in 2025 is a major privacy setback.

Gift Card Fraud
From Schneier on Security

Gift Card Fraud

It’s becoming an organized crime tactic: Card draining is when criminals remove gift cards from a store display, open them in a separate location, and either record...

Casino Players Using Hidden Cameras for Cheating
From Schneier on Security

Casino Players Using Hidden Cameras for Cheating

The basic strategy is to place a device with a hidden camera in a position to capture normally hidden card values, which are interpreted by an accomplice off-site...

Friday Squid Blogging: Squid on Pizza
From Schneier on Security

Friday Squid Blogging: Squid on Pizza

Pizza Hut in Taiwan has a history of weird pizzas, including a “2022 scalloped pizza with Oreos around the edge, and deep-fried chicken and calamari studded throughout...

Scams Based on Fake Google Emails
From Schneier on Security

Scams Based on Fake Google Emails

Scammers are hacking Google Forms to send email to victims that come from google.com. Brian Krebs reports on the effects. Boing Boing post.

Spyware Maker NSO Group Found Liable for Hacking WhatsApp
From Schneier on Security

Spyware Maker NSO Group Found Liable for Hacking WhatsApp

A judge has found that NSO Group, maker of the Pegasus spyware, has violated the US Computer Fraud and Abuse Act by hacking WhatsApp in order to spy on people using...

Criminal Complaint against LockBit Ransomware Writer
From Schneier on Security

Criminal Complaint against LockBit Ransomware Writer

The Justice Department has published the criminal complaint against Dmitry Khoroshev, for building and maintaining the LockBit ransomware.

Friday Squid Blogging: Squid Sticker
From Schneier on Security

Friday Squid Blogging: Squid Sticker

A sticker for your water bottle. Blog moderation policy.

Mailbox Insecurity
From Schneier on Security

Mailbox Insecurity

It turns out that all cluster mailboxes in the Denver area have the same master key. So if someone robs a postal carrier, they can open any mailbox. I get that...

New Advances in the Understanding of Prime Numbers
From Schneier on Security

New Advances in the Understanding of Prime Numbers

Really interesting research into the structure of prime numbers. Not immediately related to the cryptanalysis of prime-number-based public-key algorithms, but every...

Hacking Digital License Plates
From Schneier on Security

Hacking Digital License Plates

Not everything needs to be digital and “smart.” License plates, for example: Josep Rodriguez, a researcher at security firm IOActive, has revealed a technique to...

Friday Squid Blogging: Biology and Ecology of the Colossal Squid
From Schneier on Security

Friday Squid Blogging: Biology and Ecology of the Colossal Squid

Good survey paper. Blog moderation policy.

Ultralytics Supply-Chain Attack
From Schneier on Security

Ultralytics Supply-Chain Attack

Last week, we saw a supply-chain attack against the Ultralytics AI library on GitHub. A quick summary: On December 4, a malicious version 8.3.41 of the popularultralytics...

Jailbreaking LLM-Controlled Robots
From Schneier on Security

Jailbreaking LLM-Controlled Robots

Surprising no one, it’s easy to trick an LLM-controlled robot into ignoring its safety instructions.

Full-Face Masks to Frustrate Identification
From Schneier on Security

Full-Face Masks to Frustrate Identification

This is going to be interesting. It’s a video of someone trying on a variety of printed full-face masks. They won’t fool anyone for long, but will survive casual...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account