acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Fourth WikiLeaks CIA Attack Tool Dump
From Schneier on Security

Fourth WikiLeaks CIA Attack Tool Dump

WikiLeaks is obviously playing their Top Secret CIA data cache for as much press as they can, leaking the documents a little at a time. On Friday they published...

Shadow Brokers Releases the Rest of their NSA Hacking Tools
From Schneier on Security

Shadow Brokers Releases the Rest of their NSA Hacking Tools

Last August, an unknown group called the Shadow Brokers released a bunch of NSA tools to the public. The common guesses were that the tools were discovered on an...

Friday Squid Blogging: Squid Can Edit Their Own RNA
From Schneier on Security

Friday Squid Blogging: Squid Can Edit Their Own RNA

This is just plain weird: Rosenthal, a neurobiologist at the Marine Biological Laboratory, was a grad student studying a specific protein in squid when he got an...

Incident Response as "Hand-to-Hand Combat"
From Schneier on Security

Incident Response as "Hand-to-Hand Combat"

NSA Deputy Director Richard Ledgett described a 2014 Russian cyber attack against the U.S. State Department as "hand-to-hand" combat: "It was hand-to-hand combat...

Hacking a Brazilian Bank
From Schneier on Security

Hacking a Brazilian Bank

A detailed account....

Many Android Phones Vulnerable to Attacks Over Malicious Wi-Fi Networks
From Schneier on Security

Many Android Phones Vulnerable to Attacks Over Malicious Wi-Fi Networks

There's ablog post from Google's Project Zero detailing an attack against Android phones over Wi-Fi. From Ars Technica: The vulnerability resides in a widely used...

APT10 and Cloud Hopper
From Schneier on Security

APT10 and Cloud Hopper

There's a new report of a nation-state attack, presumed to be from China, on a series of managed ISPs. From the executive summary: Since late 2016, PwC UK and BAE...

Clever Physical ATM Attack
From Schneier on Security

Clever Physical ATM Attack

This is an interesting combination of computer and physical attack: Researchers from the Russian security firm Kaspersky on Monday detailed a new ATM-emptying attack...

Encryption Policy and Freedom of the Press
From Schneier on Security

Encryption Policy and Freedom of the Press

Interesting law journal article: "Encryption and the Press Clause," by D. Victoria Barantetsky. Abstract: Almost twenty years ago, a hostile debate over whether...

Acoustic Attack Against Accelerometers
From Schneier on Security

Acoustic Attack Against Accelerometers

Interesting acoustic attack against the MEMS accelerometers in devices like FitBits. Millions of accelerometers reside inside smartphones, automobiles, medical...

Soon You'll Be Able to Hijack Weaponized Police Drones in Connecticut
From Schneier on Security

Soon You'll Be Able to Hijack Weaponized Police Drones in Connecticut

Not content with having a fleet of insecure surveillance drones, the state of Connecticut wants a fleet of insecure weaponized drones. What could possibly go wrong...

Friday Squid Blogging: 1887 Animal-Combat Print with Giant Squid
From Schneier on Security

Friday Squid Blogging: 1887 Animal-Combat Print with Giant Squid

Great Victorian animal-combat scene featuring a giant squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven't...

Finding FBI Director James Comey's Twitter Account
From Schneier on Security

Finding FBI Director James Comey's Twitter Account

An interesting story of uncovering an anonymous Internet social media account....

Congress Removes FCC Privacy Protections on Your Internet Usage
From Schneier on Security

Congress Removes FCC Privacy Protections on Your Internet Usage

Think about all of the websites you visit every day. Now imagine if the likes of Time Warner, AT&T, and Verizon collected all of your browsing history and sold...

Security Orchestration and Incident Response
From Schneier on Security

Security Orchestration and Incident Response

Last month at the RSA Conference, I saw a lot of companies selling security incident response automation. Their promise was to replace people with computers ­--...

Kalyna Block Cipher
From Schneier on Security

Kalyna Block Cipher

Kalyna is a block cipher that became a Ukrainian national standard in 2015. It supports block and key sizes of 128, 256, and 512 bits. Its structure looks like...

The TSA's Selective Laptop Ban
From Schneier on Security

The TSA's Selective Laptop Ban

Last Monday, the TSA announced a peculiar new security measure to take effect within 96 hours. Passengers flying into the US on foreign airlines from eight Muslim...

Friday Squid Blogging: Squid from Utensils
From Schneier on Security

Friday Squid Blogging: Squid from Utensils

Available on eBay. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Commenting Policy for This Blog
From Schneier on Security

Commenting Policy for This Blog

Over the past few months, I have been watching my blog comments decline in civility. I blame it in part on the contentious US election and its aftermath. It's also...

Second WikiLeaks Dump of CIA Documents
From Schneier on Security

Second WikiLeaks Dump of CIA Documents

There are more CIA documents up on WikiLeaks. It seems to be mostly MacOS and iOS. News article....
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account