acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

SHA-1 Collision Found
From Schneier on Security

SHA-1 Collision Found

The first collision in the SHA-1 hash function has been found. This is not a surprise. We've all expected this for over a decade, watching computing power increase...

NSA Using Cyberattack for Defense
From Schneier on Security

NSA Using Cyberattack for Defense

These days, it's rare that we learn something new from the Snowden documents. But Ben Buchanan found something interesting. The NSA penetrates enemy networks in...

German Government Classifies Doll as Illegal Spyware
From Schneier on Security

German Government Classifies Doll as Illegal Spyware

This is interesting: The My Friend Cayla doll, which is manufactured by the US company Genesis Toys and distributed in Europe by Guildford-based Vivid Toy Group...

Friday Squid Blogging: The Strawberry Squid's Lopsided Eyes
From Schneier on Security

Friday Squid Blogging: The Strawberry Squid's Lopsided Eyes

The evolutionary reasons why the strawberry squid has two different eyes. Additional articles. Original paper. As usual, you can also use this squid post to talk...

IoT Attack Against a University Network
From Schneier on Security

IoT Attack Against a University Network

Verizon's Data Brief Digest 2017 describes an attack against an unnamed university by attackers who hacked a variety of IoT devices and had them spam network targets...

Duqu Malware Techniques Used by Cybercriminals
From Schneier on Security

Duqu Malware Techniques Used by Cybercriminals

Duqu 2.0 is a really impressive piece of malware, related to Stuxnet and probably written by the NSA. One of its security features is that it stays resident in...

Research into the Root Causes of Terrorism
From Schneier on Security

Research into the Root Causes of Terrorism

Interesting article in Science discussing field research on how people are radicalized to become terrorists. The potential for research that can overcome existing...

Survey Data on Americans and Cybersecurity
From Schneier on Security

Survey Data on Americans and Cybersecurity

Pew Research just published their latest research data on Americans and their views on cybersecurity: This survey finds that a majority of Americans have directly...

Hacking Back
From Schneier on Security

Hacking Back

There's a really interesting paper from George Washington University on hacking back: "Into the Gray Zone: The Private Sector and Active Defense against Cyber Threats...

Friday Squid Blogging: Squid Communication through Skin Patterns
From Schneier on Security

Friday Squid Blogging: Squid Communication through Skin Patterns

Interesting research. (Popular article here.) As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.....

CSIS's Cybersecurity Agenda
From Schneier on Security

CSIS's Cybersecurity Agenda

The Center for Strategic and International Studies (CSIS) published "From Awareness to Action: A Cybersecurity Agenda for the 45th President" (press release here)...

De-Anonymizing Browser History Using Social-Network Data
From Schneier on Security

De-Anonymizing Browser History Using Social-Network Data

Interesting research: "De-anonymizing Web Browsing Data with Social Networks": Abstract: Can online trackers and network adversaries de-anonymize web browsing data...

Security and Privacy Guidelines for the Internet of Things
From Schneier on Security

Security and Privacy Guidelines for the Internet of Things

Lately, I have been collecting IoT security and privacy guidelines. Here's everything I've found: "Internet of Things (IoT) Broadband Internet Technical Advisory...

Do-It-Yourself Online Privacy/Safety Guide
From Schneier on Security

Do-It-Yourself Online Privacy/Safety Guide

This online safety guide was written for people concerned about being tracked and stalked online. It's a good resource....

Predicting a Slot Machine's PRNG
From Schneier on Security

Predicting a Slot Machine's PRNG

Wired is reporting on a new slot machine hack. A Russian group has reverse-engineered a particular brand of slot machine -- from Austrian company Novomatic -- and...

Profile of Citizen Lab and Ron Diebert
From Schneier on Security

Profile of Citizen Lab and Ron Diebert

Here's a nice profile of Citizen Lab and its director, Ron Diebert. Citizen Lab is a jewel. There should be more of them....

Cryptkeeper Bug
From Schneier on Security

Cryptkeeper Bug

The Linux encryption app Cryptkeeper has a rather stunning security bug: the single-character decryption key "p" decrypts everything: The flawed version is in Debian...

Hacker Leaks Cellebrite's Phone-Hacking Tools
From Schneier on Security

Hacker Leaks Cellebrite's Phone-Hacking Tools

In January we learned that a hacker broke into Cellebrite's network and stole 900GB of data. Now the hacker has dumped some of Cellebrite's phone-hacking tools...

Friday Squid Blogging: Whale Mistakes Plastic Bags for Squid
From Schneier on Security

Friday Squid Blogging: Whale Mistakes Plastic Bags for Squid

A whale recently died in Norway because there were thirty plastic bags in its stomach. Researchers believe it may have mistaken the plastic bags for squid. As usual...

How the US Secret Service Breaks into Smart Phones
From Schneier on Security

How the US Secret Service Breaks into Smart Phones

Here's an article about the US Secret Service and their Cell Phone Forensics Facility in Tulsa. I said it before and I'll say it again: the FBI needs technical...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account