acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

USB Cable Kill Switch for Laptops
From Schneier on Security

USB Cable Kill Switch for Laptops

BusKill is designed to wipe your laptop (Linux only) if it is snatched from you in a public place: The idea is to connect the BusKill cable to your Linux laptop...

Mailbox Master Keys
From Schneier on Security

Mailbox Master Keys

Here's a physical-world example of why master keys are a bad idea. It's a video of two postal thieves using a master key to open apartment building mailboxes. Changing...

Friday Squid Blogging: Giant Squid Video from the Gulf of Mexico
From Schneier on Security

Friday Squid Blogging: Giant Squid Video from the Gulf of Mexico

Fantastic video: Scientists had used a specialized camera system developed by Widder called the Medusa, which uses red light undetectable to deep sea creatures...

Chrome Extension Stealing Cryptocurrency Keys and Passwords
From Schneier on Security

Chrome Extension Stealing Cryptocurrency Keys and Passwords

A malicious Chrome extension surreptitiously steals Ethereum keys and passwords: According to Denley, the extension is dangerous to users in two ways. First, any...

Mysterious Drones are Flying over Colorado
From Schneier on Security

Mysterious Drones are Flying over Colorado

No one knows who they belong to. (Well, of course someone knows. And my guess is that it's likely that we will know soon.)...

Hacking School Surveillance Systems
From Schneier on Security

Hacking School Surveillance Systems

Lance Vick suggesting that students hack their schools' surveillance systems. "This is an ethical minefield that I feel students would be well within their rights...

Friday Squid Blogging: New Species of Bobtail Squid
From Schneier on Security

Friday Squid Blogging: New Species of Bobtail Squid

Euprymna brenneri was discovered in the waters of Okinawa. As usual, you can also use this squid post to talk about the security stories in the news that I haven't...

Chinese Hackers Bypassing Two-Factor Authentication
From Schneier on Security

Chinese Hackers Bypassing Two-Factor Authentication

Interesting story of how a Chinese state-sponsored hacking group is bypassing the RSA SecurID two-factor authentication system. How they did it remains unclear;...

ToTok Is an Emirati Spying Tool
From Schneier on Security

ToTok Is an Emirati Spying Tool

The smartphone messaging app ToTok is actually an Emirati spying tool: But the service, ToTok, is actually a spying tool, according to American officials familiar...

Friday Squid Blogging: Streamlined Quick Unfolding Investigation Drone
From Schneier on Security

Friday Squid Blogging: Streamlined Quick Unfolding Investigation Drone

Yet another squid acronym. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting...

Lousy IoT Security
From Schneier on Security

Lousy IoT Security

DTEN makes smart screens and whiteboards for videoconferencing systems. Forescout found that their security is terrible: In total, our researchers discovered five...

Attacker Causes Epileptic Seizure Over the Internet
From Schneier on Security

Attacker Causes Epileptic Seizure Over the Internet

This isn't a first, but I think it will be the first conviction: The GIF set off a highly unusual court battle that is expected to equip those in similar circumstances...

Iranian Attacks on Industrial Control Systems
From Schneier on Security

Iranian Attacks on Industrial Control Systems

New details: At the CyberwarCon conference in Arlington, Virginia, on Thursday, Microsoft security researcher Ned Moran plans to present new findings from the company's...

Security Vulnerabilities in the RCS Texting Protocol
From Schneier on Security

Security Vulnerabilities in the RCS Texting Protocol

Interesting research: SRLabs founder Karsten Nohl, a researcher with a track record of exposing security flaws in telephony systems, argues that RCS is in many...

Upcoming Speaking Engagements
From Schneier on Security

Upcoming Speaking Engagements

This is a current list of where and when I am scheduled to speak: I'm speaking at SecIT by Heise in Hannover, Germany on March 26, 2020. The list is maintained...

Friday Squid Blogging: Color-Changing Properties of the Opalescent Inshore Squid
From Schneier on Security

Friday Squid Blogging: Color-Changing Properties of the Opalescent Inshore Squid

Interesting stuff. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines...

EFF on the Mechanics of Corporate Surveillance
From Schneier on Security

EFF on the Mechanics of Corporate Surveillance

EFF has published a comprehensible and very readable "deep dive" into the technologies of corporate surveillance, both on the Internet and off. Well worth reading...

Scaring People into Supporting Backdoors
From Schneier on Security

Scaring People into Supporting Backdoors

Back in 1998, Tim May warned us of the "Four Horsemen of the Infocalypse": "terrorists, pedophiles, drug dealers, and money launderers." I tended to cast it slightly...

Extracting Data from Smartphones
From Schneier on Security

Extracting Data from Smartphones

Privacy International has published a detailed, technical examination of how data is extracted from smartphones....

Reforming CDA 230
From Schneier on Security

Reforming CDA 230

There's a serous debate on reforming Section 230 of the Communications Decency Act. I am in the process of figuring out what I believe, and this is more a place...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account