acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Stalkerware Vendor Hacked
From Schneier on Security

Stalkerware Vendor Hacked

The stalkerware company LetMeSpy has been hacked: TechCrunch reviewed the leaked data, which included years of victims’ call logs and text messages dating back...

Typing Incriminating Evidence in the Memo Field
From Schneier on Security

Typing Incriminating Evidence in the Memo Field

Don’t do it: Recently, the manager of the Harvard Med School morgue was accused of stealing and selling human body parts. Cedric Lodge and his wife Denise were...

Excel Data Forensics
From Schneier on Security

Excel Data Forensics

In this detailed article about academic plagiarism are some interesting details about how to do data forensics on Excel files. It really needs the graphics to understand...

Friday Squid Blogging: Giggling Squid
From Schneier on Security

Friday Squid Blogging: Giggling Squid

Giggling Squid is a Thai chain in the UK. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read...

UPS Data Harvested for SMS Phishing Attacks
From Schneier on Security

UPS Data Harvested for SMS Phishing Attacks

I get UPS phishing spam on my phone all the time. I never click on it, because it’s so obviously spam. Turns out that hackers have been harvesting actual UPS delivery...

AI as Sensemaking for Public Comments
From Schneier on Security

AI as Sensemaking for Public Comments

It’s become fashionable to think of artificial intelligence as an inherently dehumanizing technology, a ruthless force of automation that has unleashed legionsprognostications...

Ethical Problems in Computer Security
From Schneier on Security

Ethical Problems in Computer Security

Tadayoshi Kohno, Yasemin Acar, and Wulf Loh wrote excellent paper on ethical thinking within the computer security community: “Ethical Frameworks and Computer Security...

Power LED Side-Channel Attack
From Schneier on Security

Power LED Side-Channel Attack

This is a clever new <a href=”https://www.nassiben.com/video-based-crypta>side-channel attack: The first attack uses an Internet-connected surveillance camera to...

Friday Squid Blogging: Squid Can Edit Their RNA
From Schneier on Security

Friday Squid Blogging: Squid Can Edit Their RNA

This is just crazy: Scientists don’t yet know for sure why octopuses, and other shell-less cephalopods including squid and cuttlefish, are such prolific editors...

Security and Human Behavior (SHB) 2023
From Schneier on Security

Security and Human Behavior (SHB) 2023

I’m just back from the sixteenth Workshop on Security and Human Behavior, hosted by Alessandro Acquisti at Carnegie Mellon University in Pittsburgh. SHB is a small...

On the Need for an AI Public Option
From Schneier on Security

On the Need for an AI Public Option

Artificial intelligence will bring great benefits to all of humanity. But do we really want to entrust this revolutionary technology solely to a small group ofretired...

Identifying the Idaho Killer
From Schneier on Security

Identifying the Idaho Killer

The New York Times has a long article on the investigative techniques used to identify the person who stabbed and killed four University of Idaho students. Pay...

AI-Generated Steganography
From Schneier on Security

AI-Generated Steganography

New research suggests that AIs can produce perfectly secure steganographic images: Abstract: Steganography is the practice of encoding secret information into innocuous...

Friday Squid Blogging: Light-Emitting Squid
From Schneier on Security

Friday Squid Blogging: Light-Emitting Squid

It’s a Taningia danae: Their arms are lined with two rows of sharp retractable hooks. And, like most deep-sea squid, they are adorned with light organs called photophores...

Operation Triangulation: Zero-Click iPhone Malware
From Schneier on Security

Operation Triangulation: Zero-Click iPhone Malware

Kaspersky is reporting a zero-click iOS exploit in the wild: Mobile device backups contain a partial copy of the filesystem, including some of the user data and...

Paragon Solutions Spyware: Graphite
From Schneier on Security

Paragon Solutions Spyware: Graphite

Paragon Solutions is yet another Israeli spyware company. Their product is called “Graphite,” and is a lot like NSO Group’s Pegasus. And Paragon is working with...

How Attorneys Are Harming Cybersecurity Incident Response
From Schneier on Security

How Attorneys Are Harming Cybersecurity Incident Response

New paper: “Lessons Lost: Incident Response in the Age of Cyber Insurance and Breach Attorneys“: Abstract: Incident Response (IR) allows victim firms to detect,...

Snowden Ten Years Later
From Schneier on Security

Snowden Ten Years Later

In 2013 and 2014, I wrote extensively about new revelations regarding NSA surveillance based on the documents provided by Edward Snowden. But I had a more personal...

The Software-Defined Car
From Schneier on Security

The Software-Defined Car

Developers are starting to talk about the software-defined car. For decades, features have accumulated like cruft in new vehicles: a box here to control the antilock...

Friday Squid Blogging: Squid Chromolithographs
From Schneier on Security

Friday Squid Blogging: Squid Chromolithographs

Beautiful illustrations. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog postinghere...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account