acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Apple Is Finally Encrypting iCloud Backups
From Schneier on Security

Apple Is Finally Encrypting iCloud Backups

After way too many years, Apple is finally encrypting iCloud backups: Based on a screenshot from Apple, these categories are covered when you flip on Advanced Data...

Friday Squid Blogging: China Bans Taiwanese Squid Imports
From Schneier on Security

Friday Squid Blogging: China Bans Taiwanese Squid Imports

Today I have some squid geopolitical news. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read...

Hacking Trespass Law
From Schneier on Security

Hacking Trespass Law

This article talks about public land in the US that is completely surrounded by private land, which in some cases makes it inaccessible to the public. But there...

Security Vulnerabilities in Eufy Cameras
From Schneier on Security

Security Vulnerabilities in Eufy Cameras

Eufy cameras claim to be local only, but upload data to the cloud. The company is basically lying to reporters, despite being shown evidence to the contrary. The...

Leaked Signing Keys Are Being Used to Sign Malware
From Schneier on Security

Leaked Signing Keys Are Being Used to Sign Malware

A bunch of Android OEM signing keys have been leaked or stolen, and they are actively being used to sign malware. Łukasz Siewierski, a member of Google’s Android...

The Decoupling Principle
From Schneier on Security

The Decoupling Principle

This is a really interesting paper that discusses what the authors call the Decoupling Principle: The idea is simple, yet previously not clearly articulated: to...

CryWiper Data Wiper Targeting Russian Sites
From Schneier on Security

CryWiper Data Wiper Targeting Russian Sites

Kaspersky is reporting on a data wiper masquerading as ransomware that is targeting local Russian government networks. The Trojan corrupts any data that’s not...

CAPTCHA
From Schneier on Security

CAPTCHA

This is an actual CAPTCHA I was shown when trying to log into PayPal. As an actual human and not a bot, I had no idea how to answer. Is this a joke? (Seems not...

Friday Squid Blogging: Legend of the Indiana Oil-Pit Squid
From Schneier on Security

Friday Squid Blogging: Legend of the Indiana Oil-Pit Squid

At a GMC plant. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines...

Existential Risk and the Fermi Paradox
From Schneier on Security

Existential Risk and the Fermi Paradox

We know that complexity is the worst enemy of security, because it makes attack easier and defense harder. This becomes catastrophic as the effects of that attack...

LastPass Security Breach
From Schneier on Security

LastPass Security Breach

The company was hacked, and customer information accessed. No passwords were compromised.

Sirius XM Software Vulnerability
From Schneier on Security

Sirius XM Software Vulnerability

This is new: Newly revealed research shows that a number of major car brands, including Honda, Nissan, Infiniti, and Acura, were affected by a previously undisclosed...

Facebook Fined $276M under GDPR
From Schneier on Security

Facebook Fined $276M under GDPR

Facebook—Meta—was just fined $276 million (USD) for a data leak that included full names, birth dates, phone numbers, and location. Meta’s total fine by the Data...

Charles V of Spain Secret Code Cracked
From Schneier on Security

Charles V of Spain Secret Code Cracked

Diplomatic code cracked after 500 years: In painstaking work backed by computers, Pierrot found “distinct families” of about 120 symbols used by Charles V. “Whole...

Computer Repair Technicians Are Stealing Your Data
From Schneier on Security

Computer Repair Technicians Are Stealing Your Data

Laptop technicians routinely violate the privacy of the people whose computers they repair: Researchers at University of Guelph in Ontario, Canada, recovered logs...

The US Has a Shortage of Bomb-Sniffing Dogs
From Schneier on Security

The US Has a Shortage of Bomb-Sniffing Dogs

Nothing beats a dog’s nose for detecting explosives. Unfortunately, there aren’t enough dogs: Last month, the US Government Accountability Office (GAO) released...

Apple’s Device Analytics Can Identify iCloud Users
From Schneier on Security

Apple’s Device Analytics Can Identify iCloud Users

Researchers claim that supposedly anonymous device analytics information can identify users: On Twitter, security researchers Tommy Mysk and Talal Haj Bakry have...

Breaking the Zeppelin Ransomware Encryption Scheme
From Schneier on Security

Breaking the Zeppelin Ransomware Encryption Scheme

Brian Krebs writes about how the Zeppelin ransomware encryption scheme was broken: The researchers said their break came when they understood that while Zeppelin...

Friday Squid Blogging: Squid Brains
From Schneier on Security

Friday Squid Blogging: Squid Brains

Researchers have new evidence of how squid brains develop: Researchers from the FAS Center for Systems Biology describe how they used a new live-imaging technique...

First Review of A Hacker’s Mind
From Schneier on Security

First Review of A Hacker’s Mind

Kirkus reviews A Hacker’s Mind: A cybersecurity expert examines how the powerful game whatever system is put before them, leaving it to others to cover the cost...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account