acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Update on NIST's Post-Quantum Cryptography Program
From Schneier on Security

Update on NIST's Post-Quantum Cryptography Program

NIST has posted an update on their post-quantum cryptography program: After spending more than three years examining new approaches to encryption and data protection...

Adversarial Machine Learning and the CFAA
From Schneier on Security

Adversarial Machine Learning and the CFAA

I just co-authored a paper on the legal risks of doing machine learning research, given the current state of the Computer Fraud and Abuse Act: Abstract: Adversarial...

Fawkes: Digital Image Cloaking
From Schneier on Security

Fawkes: Digital Image Cloaking

Fawkes is a system for manipulating digital images so that they aren't recognized by facial recognition systems. At a high level, Fawkes takes your personal images...

Hacking a Power Supply
From Schneier on Security

Hacking a Power Supply

This hack targets the firmware on modern power supplies. (Yes, power supplies are also computers.) Normally, when a phone is connected to a power brick with support...

On the Twitter Hack
From Schneier on Security

On the Twitter Hack

Twitter was hacked this week. Not a few people's Twitter accounts, but all of Twitter. Someone compromised the entire Twitter network, probably by stealing the...

Friday Squid Blogging: Squid Found on Provincetown Sandbar
From Schneier on Security

Friday Squid Blogging: Squid Found on Provincetown Sandbar

Headline: "Dozens of squid found on Provincetown sandbar." Slow news day. As usual, you can also use this squid post to talk about the security stories in the news...

Twitter Hackers May Have Bribed an Insider
From Schneier on Security

Twitter Hackers May Have Bribed an Insider

Motherboard is reporting that this week's Twitter hack involved a bribed insider. Twitter has denied it. I have been taking press calls all day about this. And...

NSA on Securing VPNs
From Schneier on Security

NSA on Securing VPNs

The NSA's Central Security Service -- that's the part that's supposed to work on defense -- has released two documents (a full and an abridged version) on securing...

Enigma Machine for Sale
From Schneier on Security

Enigma Machine for Sale

A four-rotor Enigma machine -- with rotors -- is up for auction....

A Peek into the Fake Review Marketplace
From Schneier on Security

A Peek into the Fake Review Marketplace

A personal account of someone who was paid to buy products on Amazon and leave fake reviews. Fake reviews are one of the problems that everyone knows about, and...

China Closing Its Squid Spawning Grounds
From Schneier on Security

China Closing Its Squid Spawning Grounds

China is prohibiting squid fishing in two areas -- both in international waters -- for two seasons, to give squid time to recover and reproduce. This is the first...

EFF's 30th Anniversary Livestream
From Schneier on Security

EFF's 30th Anniversary Livestream

It's the EFF's 30th birthday, and the organization is having a celebratory livestream today from 3:00 to 10:00 pm PDT. There are a lot of interesting discussions...

Business Email Compromise (BEC) Criminal Ring
From Schneier on Security

Business Email Compromise (BEC) Criminal Ring

A criminal group called Cosmic Lynx seems to be based in Russia: Dubbed Cosmic Lynx, the group has carried out more than 200 BEC campaigns since July 2019, according...

Traffic Analysis of Home Security Cameras
From Schneier on Security

Traffic Analysis of Home Security Cameras

Interesting research on home security cameras with cloud storage. Basically, attackers can learn very basic information about what's going on in front of the camera...

Half a Million IoT Passwords Leaked
From Schneier on Security

Half a Million IoT Passwords Leaked

It is amazing that this sort of thing can still happen: ...the list was compiled by scanning the entire internet for devices that were exposing their Telnet port...

IoT Security Principles
From Schneier on Security

IoT Security Principles

The BSA -- also known as the Software Alliance, formerly the Business Software Alliance -- is an industry lobbying group. They just published "Policy Principles...

ThiefQuest Ransomware for the Mac
From Schneier on Security

ThiefQuest Ransomware for the Mac

There's a new ransomware for the Mac called ThiefQuest or EvilQuest. It's hard to get infected: For your Mac to become infected, you would need to torrent a compromised...

Friday Squid Blogging: Strawberry Squid
From Schneier on Security

Friday Squid Blogging: Strawberry Squid

Pretty. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here.....

Hacked by Police
From Schneier on Security

Hacked by Police

French police hacked EncroChat secure phones, which are widely used by criminals: Encrochat's phones are essentially modified Android devices, with some models...

The Security Value of Inefficiency
From Schneier on Security

The Security Value of Inefficiency

For decades, we have prized efficiency in our economy. We strive for it. We reward it. In normal times, that's a good thing. Running just at the margins is efficient...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account