acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorBruce Schneier
bg-corner

Friday Squid Blogging: Giant Squid vs. Blue Marlin
From Schneier on Security

Friday Squid Blogging: Giant Squid vs. Blue Marlin

Epic matchup. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines ...

Russian Cyberwarfare Documents Leaked
From Schneier on Security

Russian Cyberwarfare Documents Leaked

Now this is interesting: Thousands of pages of secret documents reveal how Vulkan’s engineers have worked for Russian military and intelligence agencies to support...

The Security Vulnerabilities of Message Interoperability
From Schneier on Security

The Security Vulnerabilities of Message Interoperability

Jenny Blessing and Ross Anderson have evaluated the security of systems designed to allow the various Internet messaging platforms to interoperate with each other...

Security Vulnerabilities in Snipping Tools
From Schneier on Security

Security Vulnerabilities in Snipping Tools

Both Google’s Pixel’s Markup Tool and the Windows Snipping Tool have vulnerabilities that allow people to partially recover content that was edited out of images...

Hacks at Pwn2Own Vancouver 2023
From Schneier on Security

Hacks at Pwn2Own Vancouver 2023

An impressive array of hacks were demonstrated at the first day of the Pwn2Own conference in Vancouver: On the first day of Pwn2Own Vancouver 2023, security researchers...

Friday Squid Blogging: Creating Batteries Out of Squid Cells
From Schneier on Security

Friday Squid Blogging: Creating Batteries Out of Squid Cells

This is fascinating: “When a squid ends up chipping what’s called its ring tooth, which is the nail underneath its tentacle, it needs to regrow that tooth very...

Exploding USB Sticks
From Schneier on Security

Exploding USB Sticks

In case you don’t have enough to worry about, people are hiding explosives—actual ones—in USB sticks: In the port city of Guayaquil, journalist Lenin Artieda of...

Mass Ransomware Attack
From Schneier on Security

Mass Ransomware Attack

A vulnerability in a popular data transfer tool has resulted in a mass ransomware attack: TechCrunch has learned of dozens of organizations that used the affected...

ChatGPT Privacy Flaw
From Schneier on Security

ChatGPT Privacy Flaw

OpenAI has disabled ChatGPT’s privacy history, almost certainly because they had a security flaw where users were seeing each others’ histories.

US Citizen Hacked by Spyware
From Schneier on Security

US Citizen Hacked by Spyware

The New York Times is reporting that a US citizen’s phone was hacked by the Predator spyware. A U.S. and Greek national who worked on Meta’s security and trust...

Friday Squid Blogging: New Species of Vampire Squid Lives 3,000 Feet below Sea Level
From Schneier on Security

Friday Squid Blogging: New Species of Vampire Squid Lives 3,000 Feet below Sea Level

At least, it seems to be a new species. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my...

NetWire Remote Access Trojan Maker Arrested
From Schneier on Security

NetWire Remote Access Trojan Maker Arrested

From Brian Krebs: A Croatian national has been arrested for allegedly operating NetWire, a Remote Access Trojan (RAT) marketed on cybercrime forums since 2012 as...

Friday Squid Blogging: Chinese Squid Fishing in the Southeast Pacific
From Schneier on Security

Friday Squid Blogging: Chinese Squid Fishing in the Southeast Pacific

Chinese squid fishing boats are overwhelming Ecuador and Peru. As usual, you can also use this squid post to talk about the security stories in the news that Ihere...

Elephant Hackers
From Schneier on Security

Elephant Hackers

An elephant uses its right-of-way privileges to stop sugar-cane trucks and grab food.

Another Malware with Persistence
From Schneier on Security

Another Malware with Persistence

Here’s a piece of Chinese malware that infects SonicWall security appliances and survives firmware updates. On Thursday, security firm Mandiant published a report...

BlackLotus Malware Hijacks Windows Secure Boot Process
From Schneier on Security

BlackLotus Malware Hijacks Windows Secure Boot Process

Researchers have discovered malware that “can hijack a computer’s boot process even when Secure Boot and other advanced protections are enabled and running on fully...

Prompt Injection Attacks on Large Language Models
From Schneier on Security

Prompt Injection Attacks on Large Language Models

This is a good survey on prompt injection attacks on large language models (like ChatGPT). Abstract: We are currently witnessing dramatic advances in the capabilities...

New National Cybersecurity Strategy
From Schneier on Security

New National Cybersecurity Strategy

Last week the Biden Administration released a new National Cybersecurity Strategy (summary >here. There is lots of good commentary out there. It’s basically a smart...

Nick Weaver on Regulating Cryptocurrency
From Schneier on Security

Nick Weaver on Regulating Cryptocurrency

Nicholas Weaver wrote an excellent paper on the problems of cryptocurrencies and the need to regulate the space—with all existing regulations. His conclusion: Regulators...

Dumb Password Rules
From Schneier on Security

Dumb Password Rules

Troy Hunt is collecting examples of dumb password rules. There are some pretty bad disasters out there. My worst experiences are with sites that have artificial...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account