acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Authentication Failure
From Schneier on Security

Authentication Failure

This is a weird story of a building owner commissioning an artist to paint a mural on the side of his building — except that he wasn’t actually the building’s owner...

Friday Squid Blogging: Newly Identified Ichthyosaur Species Probably Ate Squid
From Schneier on Security

Friday Squid Blogging: Newly Identified Ichthyosaur Species Probably Ate Squid

This is a deep-diving species that “fed on small prey items such as squid.” Academic paper. As usual, you can also use this squid post to talk about the security...

A Cybersecurity Policy Agenda
From Schneier on Security

A Cybersecurity Policy Agenda

The Aspen Institute’s Aspen Cybersecurity Group — I’m a member — has released its cybersecurity policy agenda for the next four years. The next administration and...

Finnish Data Theft and Extortion
From Schneier on Security

Finnish Data Theft and Extortion

The Finnish psychotherapy clinic Vastaamo was the victim of a data breach and theft. The criminals tried extorting money from the clinic. When that failed, they...

FireEye Hacked
From Schneier on Security

FireEye Hacked

FireEye was hacked by — they believe — “a nation with top-tier offensive capabilities”: During our investigation to date, we have found that the attacker targeted...

Oblivious DNS-over-HTTPS
From Schneier on Security

Oblivious DNS-over-HTTPS

This new protocol, called Oblivious DNS-over-HTTPS (ODoH), hides the websites you visit from your ISP. Here’s how it works: ODoH wraps a layer of encryption around...

The 2020 Workshop on Economics and Information Security (WEIS)
From Schneier on Security

The 2020 Workshop on Economics and Information Security (WEIS)

The workshop on Economics and Information Security is always an interesting conference. This year, it will be online. Here’s the program. Registration is free.

Hiding Malware in Social Media Buttons
From Schneier on Security

Hiding Malware in Social Media Buttons

Clever tactic: This new malware was discovered by researchers at Dutch cyber-security company Sansec that focuses on defending e-commerce websites from digital...

Enigma Machine Recovered from the Baltic Sea
From Schneier on Security

Enigma Machine Recovered from the Baltic Sea

Neat story: German divers searching the Baltic Sea for discarded fishing nets have stumbled upon a rare Enigma cipher machine used by the Nazi military during...

Open Source Does Not Equal Secure
From Schneier on Security

Open Source Does Not Equal Secure

Way back in 1999, I wrote about open-source software: First, simply publishing the code does not automatically mean that people will examine it for security flaws...

Impressive iPhone Exploit
From Schneier on Security

Impressive iPhone Exploit

This is a scarily impressive vulnerability: Earlier this year, Apple patched one of the most breathtaking iPhone vulnerabilities ever: a memory corruption bugbuffer...

Manipulating Systems Using Remote Lasers
From Schneier on Security

Manipulating Systems Using Remote Lasers

Many systems are vulnerable: Researchers at the time said that they were able to launch inaudible commands by shining lasers — from as far as 360 feet — at the...

Check Washing
From Schneier on Security

Check Washing

I can’t believe that check washing is still a thing: “Check washing” is a practice where thieves break into mailboxes (or otherwise steal mail), find envelopes...

Undermining Democracy
From Schneier on Security

Undermining Democracy

Last Thursday, Rudy Giuliani, a Trump campaign lawyer, alleged a widespread voting conspiracy involving Venezuela, Cuba, and China. Another lawyer, Sidney Powell...

Cyber Public Health
From Schneier on Security

Cyber Public Health

In a lecture, Adam Shostack makes the case for a discipline of cyber public health. It would relate to cybersecurity in a similar way that public health relates...

On That Dusseldorf Hospital Ransomware Attack and the Resultant Death
From Schneier on Security

On That Dusseldorf Hospital Ransomware Attack and the Resultant Death

Wired has a detailed story about the ransomware attack on a Dusseldorf hospital, the one that resulted in an ambulance being redirected to a more distant hospital...

More on the Security of the 2020 US Election
From Schneier on Security

More on the Security of the 2020 US Election

Last week I signed on to two joint letters about the security of the 2020 election. The first was as one of 59 election security experts, basically saying that...

Indistinguishability Obfuscation
From Schneier on Security

Indistinguishability Obfuscation

Quanta magazine recently published a breathless article on indistinguishability obfuscation — calling it the “‘crown jewel’ of cryptography” — and saying that it...

Symantec Reports on Cicada APT Attacks against Japan
From Schneier on Security

Symantec Reports on Cicada APT Attacks against Japan

Symantec is reporting on an APT group linked to China, named Cicada. They have been attacking organizations in Japan and elsewhere. Cicada has historically been...

The US Military Buys Commercial Location Data
From Schneier on Security

The US Military Buys Commercial Location Data

Vice has a long article about how the US military buys commercial location data worldwide. The U.S. military is buying the granular movement data of people around...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account