acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

New US Executive Order on Cybersecurity
From Schneier on Security

New US Executive Order on Cybersecurity

President Biden signed an executive order to improve government cybersecurity, setting new security standards for software sold to the federal government. For the...

Book Sale: Beyond Fear
From Schneier on Security

Book Sale: Beyond Fear

I have 80 copies of my 2000 book Beyond Fear available at the very cheap price of $5 plus shipping. Note that there is a 20% chance that your book will have a “BT...

AI Security Risk Assessment Tool
From Schneier on Security

AI Security Risk Assessment Tool

Microsoft researchers just released an open-source automation tool for security testing AI systems: “Counterfit.” Details on their blog.

Ransomware Shuts Down US Pipeline
From Schneier on Security

Ransomware Shuts Down US Pipeline

This is a major story: a probably Russian cybercrime group called DarkSide shut down the Colonial Pipeline in a ransomware attack. The pipeline supplies much of...

Newly Unclassified NSA Document on Cryptography in the 1970s
From Schneier on Security

Newly Unclassified NSA Document on Cryptography in the 1970s

This is a newly unclassified NSA history of its reaction to academic cryptography in the 1970s: “New Comes Out of the Closet: The Debate over Public Cryptography...

Teaching Cybersecurity to Children
From Schneier on Security

Teaching Cybersecurity to Children

A new draft of an Australian educational curriculum proposes teaching children as young as five cybersecurity: The proposed curriculum aims to teach five-year-old...

Friday Squid Blogging: Far Side Squid Comic
From Schneier on Security

Friday Squid Blogging: Far Side Squid Comic

A classic. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here...

Friday Squid Blogging: COVID Relief Funds
From Schneier on Security

Friday Squid Blogging: COVID Relief Funds

A town in Japan built a giant squid statue with its COVID relief grant. One local told the Chunichi Shimbun newspaper that while the statue may be effective in...

The Story of Colossus
From Schneier on Security

The Story of Colossus

Nice video of a talk by Chris Shore on the history of Colossus.

Friday Squid Blogging: Picking up Squid on the Beach
From Schneier on Security

Friday Squid Blogging: Picking up Squid on the Beach

Make sure they’re dead. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines...

Friday Squid Blogging: Underwater Cameras for Observing Squid
From Schneier on Security

Friday Squid Blogging: Underwater Cameras for Observing Squid

Interesting research paper. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting...

New Spectre-Like Attacks
From Schneier on Security

New Spectre-Like Attacks

There’s new research that demonstrates security vulnerabilities in all of the AMD and Intel chips with micro-op caches, including the ones that were specifically...

Tesla Remotely Hacked from a Drone
From Schneier on Security

Tesla Remotely Hacked from a Drone

This is an impressive hack: Security researchers Ralf-Philipp Weinmann of Kunnamon, Inc. and Benedikt Schmotzle of Comsecuris GmbH have found remote zero-click...

Identifying the Person Behind Bitcoin Fog
From Schneier on Security

Identifying the Person Behind Bitcoin Fog

The person behind the Bitcoin Fog was identified and arrested. Bitcoin Fog was an anonymization service: for a fee, it mixed a bunch of people’s bitcoins up so...

Serious MacOS Vulnerability Patched
From Schneier on Security

Serious MacOS Vulnerability Patched

Apple just patched a MacOS vulnerability that bypassed malware checks. The flaw is akin to a front entrance that’s barred and bolted effectively, but with a cat...

Friday Squid Blogging: On Squid Coloration
From Schneier on Security

Friday Squid Blogging: On Squid Coloration

Nice excerpt from Martin Wallin’s book Squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read...

Identifying People Through Lack of Cell Phone Use
From Schneier on Security

Identifying People Through Lack of Cell Phone Use

In this entertaining story of French serial criminal Rédoine Faïd and his jailbreaking ways, there’s this bit about cell phone surveillance: After Faïd’s helicopter...

Second Click Here to Kill Everybody Sale
From Schneier on Security

Second Click Here to Kill Everybody Sale

For a limited time, I am selling signed copies of Click Here to Kill Everybody in hardcover for just $6, plus shipping. I have 600 copies of the book available....

Security Vulnerabilities in Cellebrite
From Schneier on Security

Security Vulnerabilities in Cellebrite

Moxie Marlinspike has an intriguing blog post about Cellebrite, a tool used by police and others to break into smartphones. Moxie got his hands on one of the devices...

On North Korea’s Cyberattack Capabilities
From Schneier on Security

On North Korea’s Cyberattack Capabilities

Excellent New Yorker article on North Korea’s offensive cyber capabilities.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account