acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Criminals and the Normalization of Masks
From Schneier on Security

Criminals and the Normalization of Masks

I was wondering about this: Masks that have made criminals stand apart long before bandanna-wearing robbers knocked over stagecoaches in the Old West and ski-masked...

AI and Cybersecurity
From Schneier on Security

AI and Cybersecurity

Ben Buchanan has written "A National Security Research Agenda for Cybersecurity and Artificial Intelligence." It's really good -- well worth reading....

Ramsey Malware
From Schneier on Security

Ramsey Malware

A new malware, called Ramsey, can jump air gaps: ESET said they've been able to track down three different versions of the Ramsay malware, one compiled in September...

Friday Squid Blogging: Vegan "Squid" Made from Chickpeas
From Schneier on Security

Friday Squid Blogging: Vegan "Squid" Made from Chickpeas

It's beyond Beyond Meat. A Singapore company wants to make vegan "squid" -- and shrimp and crab -- from chickpeas. As usual, you can also use this squid post to...

On Marcus Hutchins
From Schneier on Security

On Marcus Hutchins

Long and nuanced story about Marcus Hutchins, the British hacker who wrote most of the Kronos malware and also stopped WannaCry in real time. Well worth reading...

US Government Exposes North Korean Malware
From Schneier on Security

US Government Exposes North Korean Malware

US Cyber Command has uploaded North Korean malware samples to the VirusTotal aggregation repository, adding to the malware samples it uploaded in February. The...

New U.S. Electronic Warfare Platform
From Schneier on Security

New U.S. Electronic Warfare Platform

The Army is developing a new electronic warfare pod capable of being put on drones and on trucks. ...the Silent Crow pod is now the leading contender for the flying...

Attack Against PC Thunderbolt Port
From Schneier on Security

Attack Against PC Thunderbolt Port

The attack requires physical access to the computer, but it's pretty devastating: On Thunderbolt-enabled Windows or Linux PCs manufactured before 2019, his technique...

Another California Data Privacy Law
From Schneier on Security

Another California Data Privacy Law

The California Consumer Privacy Act is a lesson in missed opportunities. It was passed in haste, to stop a ballot initiative that would have been even more restrictive...

Friday Squid Blogging: Jurassic Squid Attack
From Schneier on Security

Friday Squid Blogging: Jurassic Squid Attack

It's the oldest squid attack on record: An ancient squid-like creature with 10 arms covered in hooks had just crushed the skull of its prey in a vicious attack...

Used Tesla Components Contain Personal Information
From Schneier on Security

Used Tesla Components Contain Personal Information

Used Tesla components, sold on eBay, still contain personal information, even after a factory reset. This is a decades-old problem. It's a problem with used hard...

iOS XML Bug
From Schneier on Security

iOS XML Bug

This is a good explanation of an iOS bug that allowed someone to break out of the application sandbox. A summary: What a crazy bug, and Siguza's explanation is...

ILOVEYOU Virus
From Schneier on Security

ILOVEYOU Virus

It's the twentieth anniversary of the ILOVEYOU virus, and here are three interesting articles about it and its effects on software design....

Malware in Google Apps
From Schneier on Security

Malware in Google Apps

Interesting story of malware hidden in Google Apps. This particular campaign is tied to the government of Vietnam. At a remote virtual version of its annual Security...

Denmark, Sweden, Germany, the Netherlands and France SIGINT Alliance
From Schneier on Security

Denmark, Sweden, Germany, the Netherlands and France SIGINT Alliance

This paper describes a SIGINT and code-breaking alliance between Denmark, Sweden, Germany, the Netherlands and France called Maximator: Abstract: This article is...

Friday Squid Blogging: Cocaine Smuggled in Squid
From Schneier on Security

Friday Squid Blogging: Cocaine Smuggled in Squid

Makes sense; there's room inside a squid's body cavity: Latin American drug lords have sent bumper shipments of cocaine to Europe in recent weeks, including one...

Me on COVAD-19 Contact Tracing Apps
From Schneier on Security

Me on COVAD-19 Contact Tracing Apps

I was quoted in BuzzFeed: "My problem with contact tracing apps is that they have absolutely no value," Bruce Schneier, a privacy expert and fellow at the Berkman...

Securing Internet Videoconferencing Apps: Zoom and Others
From Schneier on Security

Securing Internet Videoconferencing Apps: Zoom and Others

The NSA just published a survey of video conferencing apps. So did Mozilla. Zoom is on the good list, with some caveats. The company has done a lot of work addressing...

How Did Facebook Beat a Federal Wiretap Demand?
From Schneier on Security

How Did Facebook Beat a Federal Wiretap Demand?

This is interesting: Facebook Inc. in 2018 beat back federal prosecutors seeking to wiretap its encrypted Messenger app. Now the American Civil Liberties Union...

Fooling NLP Systems Through Word Swapping
From Schneier on Security

Fooling NLP Systems Through Word Swapping

MIT researchers have built a system that fools natural-language processing systems by swapping words with synonyms: The software, developed by a team at MIT, looks...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account