acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Another Intel Speculative Execution Vulnerability
From Schneier on Security

Another Intel Speculative Execution Vulnerability

Remember Spectre and Meltdown? Back in early 2018, I wrote: Spectre and Meltdown are pretty catastrophic vulnerabilities, but they only affect the confidentiality...

Availability Attacks against Neural Networks
From Schneier on Security

Availability Attacks against Neural Networks

New research on using specially crafted inputs to slow down machine-learning neural network systems: Sponge Examples: Energy-Latency Attacks on Neural Networks...

Security Analysis of the Democracy Live Online Voting System
From Schneier on Security

Security Analysis of the Democracy Live Online Voting System

New research: "Security Analysis of the Democracy Live Online Voting System": Abstract: Democracy Live's OmniBallot platform is a web-based system for blank ballot...

Gene Spafford on Internet Voting
From Schneier on Security

Gene Spafford on Internet Voting

Good interview....

Phishing Attacks Against Trump and Biden Campaigns
From Schneier on Security

Phishing Attacks Against Trump and Biden Campaigns

Google's threat analysts have identified state-level attacks from China. I hope both campaigns are working under the assumption that everything they say and do...

Friday Squid Blogging: Shark vs. Squid
From Schneier on Security

Friday Squid Blogging: Shark vs. Squid

National Geographic has a photo of a 7-foot long shark that fought a giant squid and lived to tell the tale. Or, at least, lived to show off the suction marks on...

New Research: "Privacy Threats in Intimate Relationships"
From Schneier on Security

New Research: "Privacy Threats in Intimate Relationships"

I just published a new paper with Karen Levy of Cornell: "Privacy Threats in Intimate Relationships." Abstract: This article provides an overview of intimate threats...

Zoom's Commitment to User Security Depends on Whether you Pay It or Not
From Schneier on Security

Zoom's Commitment to User Security Depends on Whether you Pay It or Not

Zoom was doing so well.... And now we have this: Corporate clients will get access to Zoom's end-to-end encryption service now being developed, but Yuan said free...

Wallpaper that Crashes Android Phones
From Schneier on Security

Wallpaper that Crashes Android Phones

This is interesting: The image, a seemingly innocuous sunset (or dawn) sky above placid waters, may be viewed without harm. But if loaded as wallpaper, the phone...

"Sign in with Apple" Vulnerability
From Schneier on Security

"Sign in with Apple" Vulnerability

Researcher Bhavuk Jain discovered a vulnerability in the "Sign in with Apple" feature, and received a $100,000 bug bounty from Apple. Basically, forged tokens could...

Password Changing After a Breach
From Schneier on Security

Password Changing After a Breach

This study shows that most people don't change their passwords after a breach, and if they do they change it to a weaker password. Abstract: To protect against...

Friday Squid Blogging: Humboldt Squid Communication
From Schneier on Security

Friday Squid Blogging: Humboldt Squid Communication

Humboldt Squid communicate by changing their skin patterns and glowing. As usual, you can also use this squid post to talk about the security stories in the news...

Bogus Security Technology: An Anti-5G USB Stick
From Schneier on Security

Bogus Security Technology: An Anti-5G USB Stick

The 5GBioShield sells for £339.60, and the description sounds like snake oil: ...its website, which describes it as a USB key that "provides protection for your...

Facebook Announces Messenger Security Features that Don't Compromise Privacy
From Schneier on Security

Facebook Announces Messenger Security Features that Don't Compromise Privacy

Note that this is "announced," so we don't know when it's actually going to be implemented. Facebook today announced new features for Messenger that will alert...

Thermal Imaging as Security Theater
From Schneier on Security

Thermal Imaging as Security Theater

Seems like thermal imaging is the security theater technology of today. These features are so tempting that thermal cameras are being installed at an increasing...

Websites Conducting Port Scans
From Schneier on Security

Websites Conducting Port Scans

Security researcher Charlie Belmer is reporting that commercial websites such as eBay are conducting port scans of their visitors. Looking at the list of ports...

Bluetooth Vulnerability: BIAS
From Schneier on Security

Bluetooth Vulnerability: BIAS

This is new research on a Bluetooth vulnerability (called BIAS) that allows someone to impersonate a trusted device: Abstract: Bluetooth (BR/EDR) is a pervasive...

Friday Squid Blogging: Squid Can Edit Their Own Genomes
From Schneier on Security

Friday Squid Blogging: Squid Can Edit Their Own Genomes

This is new news: Revealing yet another super-power in the skillful squid, scientists have discovered that squid massively edit their own genetic instructions not...

Ann Mitchell, Bletchley Park Cryptanalyst, Dies
From Schneier on Security

Ann Mitchell, Bletchley Park Cryptanalyst, Dies

Obituary....

Bart Gellman on Snowden
From Schneier on Security

Bart Gellman on Snowden

Bart Gellman's long-awaited (at least by me) book on Edward Snowden, Dark Mirror: Edward Snowden and the American Surveillance State, will finally be published...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account