acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Another Shadow Brokers Leak
From Schneier on Security

Another Shadow Brokers Leak

There's another leak of NSA hacking tools and data from the Shadow Brokers. This one includes a list of hacked sites. According to analyses from researchers here...

Card Game Based on the Iterated Prisoner's Dilemma
From Schneier on Security

Card Game Based on the Iterated Prisoner's Dilemma

Interesting....

How to Avoid Kidnapping Children on Halloween
From Schneier on Security

How to Avoid Kidnapping Children on Halloween

A useful guide....

A High-End Card-Reading Device
From Schneier on Security

A High-End Card-Reading Device

An impressive Chinese device that automatically reads marked cards in order to cheat at poker and other card games....

Friday Squid Blogging: Squid Nebula
From Schneier on Security

Friday Squid Blogging: Squid Nebula

Beautiful. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Eavesdropping on Typing Over Voice-Over-IP
From Schneier on Security

Eavesdropping on Typing Over Voice-Over-IP

Interesting research: "Don't Skype & Type! Acoustic Eavesdropping in Voice-Over-IP": Abstract: Acoustic emanations of computer keyboards represent a serious privacy...

Hardware Bit-Flipping Attacks in Practice
From Schneier on Security

Hardware Bit-Flipping Attacks in Practice

A year and a half ago, I wrote about hardware bit-flipping attacks, which were then largely theoretical. Now, they can be used to root Android phones: The breakthrough...

How Powell's and Podesta's E-mail Accounts Were Hacked
From Schneier on Security

How Powell's and Podesta's E-mail Accounts Were Hacked

It was a phishing attack....

OPM Attack
From Schneier on Security

OPM Attack

Good long article on the 2015 attack against the US Office of Personnel Management....

Malicious AI
From Schneier on Security

Malicious AI

It's not hard to imagine the criminal possibilities of automation, autonomy, and artificial intelligence. But the imaginings are becoming mainstream -- and the...

UK Admitting "Offensive Cyber" Against ISIS/Daesh
From Schneier on Security

UK Admitting "Offensive Cyber" Against ISIS/Daesh

I think this might be the first time it has been openly acknowledged: Sir Michael Fallon, the defence secretary, has said Britain is using cyber warfare in the...

How Different Stakeholders Frame Security
From Schneier on Security

How Different Stakeholders Frame Security

Josephine Wolff examines different Internet governance stakeholders and how they frame security debates. Her conclusion: The tensions that arise around issues of...

DDoS Attacks against Dyn
From Schneier on Security

DDoS Attacks against Dyn

Yesterday's DDoS attacks against Dyn are being reported everywhere. I have received a gazillion press requests, but I am traveling in Australia and Asia and have...

Friday Squid Blogging: Which Squid Can I Eat?
From Schneier on Security

Friday Squid Blogging: Which Squid Can I Eat?

Interesting article listing the squid species that can still be ethically eaten. The problem, of course, is that on a restaurant menu it's just labeled "squid."...

Privacy Makes Workers More Productive
From Schneier on Security

Privacy Makes Workers More Productive

Interesting research....

President Obama Talks About AI Risk, Cybersecurity, and More
From Schneier on Security

President Obama Talks About AI Risk, Cybersecurity, and More

Interesting interview: Obama: Traditionally, when we think about security and protecting ourselves, we think in terms of armor or walls. Increasingly, I find myself...

Bypassing Intel's ASLR
From Schneier on Security

Bypassing Intel's ASLR

Researchers discover a clever attack that bypasses the address space layout randomization (ALSR) on Intel's CPUs. Here's the paper. It discusses several possible...

Security Lessons from a Power Saw
From Schneier on Security

Security Lessons from a Power Saw

Lance Spitzner looks at the safety features of a power saw and tries to apply them to Internet security: By the way, here are some of the key safety features that...

Intelligence Oversight and How It Can Fail
From Schneier on Security

Intelligence Oversight and How It Can Fail

Former NSA attorneys John DeLong and Susan Hennessay have written a fascinating article describing a particular incident of oversight failure inside the NSA. Technically...

Virtual Kidnapping
From Schneier on Security

Virtual Kidnapping

This is a harrowing story of a scam artist that convinced a mother that her daughter had been kidnapped. More stories are here. It's unclear if these virtual kidnappers...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account