acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Spear Phishing Attacks
From Schneier on Security

Spear Phishing Attacks

Really interesting research: "Unpacking Spear Phishing Susceptibility," by Zinaida Benenson, Freya Gassmann, and Robert Landwirth. Abstract: We report the results...

CIA's Pandemic Toolkit
From Schneier on Security

CIA's Pandemic Toolkit

WikiLeaks is still dumping CIA cyberweapons on the Internet. Its latest dump is something called "Pandemic": The Pandemic leak does not explain what the CIA's initial...

Friday Squid Blogging: Squid as Prey
From Schneier on Security

Friday Squid Blogging: Squid as Prey

There's lots of video of squid as undersea predators. This is one of the few instances of squid as prey (from a deep submersible in the Pacific): "We saw brittle...

WannaCry and Vulnerabilities
From Schneier on Security

WannaCry and Vulnerabilities

There is plenty of blame to go around for the WannaCry ransomware that spread throughout the Internet earlier this month, disrupting work at hospitals, factories...

Passwords at the Border
From Schneier on Security

Passwords at the Border

The password-manager 1Password has just implemented a travel mode that tries to protect users while crossing borders. It doesn't make much sense. To enable it,...

Post-Quantum RSA
From Schneier on Security

Post-Quantum RSA

Interesting research on a version of RSA that is secure against a quantum computer: Post-quantum RSA Daniel J. Bernstein, Nadia Heninger, Paul Lou, and Luke Valenta...

Inmates Secretly Build and Network Computers while in Prison
From Schneier on Security

Inmates Secretly Build and Network Computers while in Prison

This is kind of amazing: Inmates at a medium-security Ohio prison secretly assembled two functioning computers, hid them in the ceiling, and connected them to the...

Who Are the Shadow Brokers?
From Schneier on Security

Who Are the Shadow Brokers?

In 2013, a mysterious group of hackers that calls itself the Shadow Brokers stole a few disks full of NSA secrets. Since last summer, they've been dumping these...

Tainted Leaks
From Schneier on Security

Tainted Leaks

Last year, I wrote about the potential for doxers to alter documents before they leaked them. It was a theoretical threat when I wrote it, but now Citizen Lab has...

Friday Squid Blogging: Squid and Chips
From Schneier on Security

Friday Squid Blogging: Squid and Chips

The excellent Montreal chef Marc-Olivier Frappier, of Joe Beef fame, has created a squid and chips dish for Brit & Chips restaurant. As usual, you can also use...

Forbes Names Beyond Fear as One of the "13 Books Technology Executives Should Have On Their Shelves"
From Schneier on Security

Forbes Names Beyond Fear as One of the "13 Books Technology Executives Should Have On Their Shelves"

It's a good list....

Hacking the Galaxy S8's Iris Biometric
From Schneier on Security

Hacking the Galaxy S8's Iris Biometric

It was easy: The hackers took a medium range photo of their subject with a digital camera's night mode, and printed the infrared image. Then, presumably to give...

Security and Human Behavior (SHB 2017)
From Schneier on Security

Security and Human Behavior (SHB 2017)

I'm in Cambridge University, at the tenth Workshop on Security and Human Behavior. SHB is a small invitational gathering of people studying various aspects of the...

Ransomware and the Internet of Things
From Schneier on Security

Ransomware and the Internet of Things

As devastating as the latest widespread ransomware attacks have been, it's a problem with a solution. If your copy of Windows is relatively current and you've kept...

Hacking Fingerprint Readers with Master Prints
From Schneier on Security

Hacking Fingerprint Readers with Master Prints

There's interesting research on using a set of "master" digital fingerprints to fool biometric readers. The work is theoretical at the moment, but they might be...

ICE is Using Stingray to Track Illegal Immigrants
From Schneier on Security

ICE is Using Stingray to Track Illegal Immigrants

According to court documents, US Immigration and Customs Enforcement is using Stingray cell-site simulators to track illegal immigrants....

The Future of Ransomware
From Schneier on Security

The Future of Ransomware

Ransomware isn't new, but it's increasingly popular and profitable. The concept is simple: Your computer gets infected with a virus that encrypts your files until...

North Korean Cyberwar Capabilities
From Schneier on Security

North Korean Cyberwar Capabilities

Reuters has an article on North Korea's cyberwar capabilities, specifically "Unit 180." They're still not in the same league as the US, UK, Russia, China, and Israel...

Extending the Airplane Laptop Ban
From Schneier on Security

Extending the Airplane Laptop Ban

The Department of Homeland Security is rumored to be considering extending the current travel ban on large electronics for Middle Eastern flights to European ones...

Friday Squid Blogging: Giant Squid Caught Off the Coast of Ireland
From Schneier on Security

Friday Squid Blogging: Giant Squid Caught Off the Coast of Ireland

It's rare: Fishermen caught a 19-foot-long giant squid off the coast of Ireland on Monday, only the fifth to be seen there since 1673. Also the first in 22 years...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account