acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Malware Tries to Detect Test Environment
From Schneier on Security

Malware Tries to Detect Test Environment

A new malware tries to detect if it's running in a virtual machine or sandboxed test environment by looking for signs of normal use and not executing if they're...

Using Neural Networks to Identify Blurred Faces
From Schneier on Security

Using Neural Networks to Identify Blurred Faces

Neural networks are good at identifying faces, even if they're blurry: In a paper released earlier this month, researchers at UT Austin and Cornell University demonstrate...

Brian Krebs DDoS
From Schneier on Security

Brian Krebs DDoS

Brian Krebs writes about the massive DDoS attack against his site. In fact, the site is down as I post this....

Friday Squid Blogging: Space Kraken
From Schneier on Security

Friday Squid Blogging: Space Kraken

A Lego model of a giant space kraken destroying a Destroyer from Star Wars. As usual, you can also use this squid post to talk about the security stories in the...

iPhone 7 Jailbreak
From Schneier on Security

iPhone 7 Jailbreak

It took 24 hours. Slashdot thread....

Amtrak Security Awareness
From Schneier on Security

Amtrak Security Awareness

I like this Amtrak security awareness campaign. Especially the use of my term "security theater."...

Tesla Model S Hack
From Schneier on Security

Tesla Model S Hack

Impressive remote ,a href="http://www.pcworld.com/article/3121999/security/researchers-demonstrate-remote-attack-against-tesla-model-s.html">hack of the Tesla Model...

Two Good Essays on the NSA's "Upstream" Data Collection under Section 702
From Schneier on Security

Two Good Essays on the NSA's "Upstream" Data Collection under Section 702

Both are worth reading....

More on the Equities Debate
From Schneier on Security

More on the Equities Debate

This is an interesting back-and-forth: initial post by Dave Aitel and Matt Tait, a reply by Mailyn Filder, a short reply by Aitel, and a reply to the reply by Filder...

Periscope ATM Skimmers
From Schneier on Security

Periscope ATM Skimmers

"Periscope skimmers" are the most sophisticated kind of ATM skimmers. They are entirely inside the ATM, meaning they're impossible to notice. They're been found...

Friday Squid Blogging: Giant Squid on Japanese Television
From Schneier on Security

Friday Squid Blogging: Giant Squid on Japanese Television

I got this video from PZ Myers's blog. I know absolutely nothing about it. As usual, you can also use this squid post to talk about the security stories in the...

Hacking Bridge-Hand Generation Software
From Schneier on Security

Hacking Bridge-Hand Generation Software

Interesting: Roughly three weeks later, there is a operation program available to crack ACBL hand records. Given three consecutive boards, all the remaining boards...

Hacking Wireless Tire-Pressure Monitoring System
From Schneier on Security

Hacking Wireless Tire-Pressure Monitoring System

Research paper: "Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study," by Ishtiaq Rouf, Rob Miller, Hossen...

Recovering an iPhone 5c Passcode
From Schneier on Security

Recovering an iPhone 5c Passcode

Remember the San Bernadino killer's iPhone, and how the FBI maintained that they couldn't get the encryption key without Apple providing them with a universal back...

Organizational Doxing and Disinformation
From Schneier on Security

Organizational Doxing and Disinformation

In the past few years, the devastating effects of hackers breaking into an organization's network, stealing confidential data, and publishing everything have been...

Someone Is Learning How to Take Down the Internet
From Schneier on Security

Someone Is Learning How to Take Down the Internet

Over the past year or two, someone has been probing the defenses of the companies that run critical pieces of the Internet. These probes take the form of precisely...

Leaked Stingray Manuals
From Schneier on Security

Leaked Stingray Manuals

The Intercept has published the manuals for Harris Corporation's IMSI catcher: Stingray. It's an impressive surveillance device....

USB Kill Stick
From Schneier on Security

USB Kill Stick

It costs less than $60. For just a few bucks, you can pick up a USB stick that destroys almost anything that it's plugged into. Laptops, PCs, televisions, photo...

Malware Infects Network Hard Drives
From Schneier on Security

Malware Infects Network Hard Drives

The malware "Mal/Miner-C" infects Internet-exposed Seagate Central Network Attached Storage (NAS) devices, and from there takes over connected computers to mine...

Friday Squid Blogging: More Research Inspired by Squid Skin
From Schneier on Security

Friday Squid Blogging: More Research Inspired by Squid Skin

Research on color-changing materials: What do squid and jellyfish skin have in common with human skin? All three have inspired a team of chemists to create materials...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account