acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Why Are Cryptographers Being Denied Entry into the US?
From Schneier on Security

Why Are Cryptographers Being Denied Entry into the US?

In March, Adi Shamir -- that's the "S" in RSA -- was denied a US visa to attend the RSA Conference. He's Israeli. This month, British citizen Ross Anderson couldn't...

More Attacks against Computer Automatic Update Systems
From Schneier on Security

More Attacks against Computer Automatic Update Systems

Last month, Kaspersky discovered that Asus's live update system was infected with malware, an operation it called Operation Shadowhammer. Now we learn that six...

Another Intel Chip Flaw
From Schneier on Security

Another Intel Chip Flaw

Remember the Spectre and Meltdown attacks from last year? They were a new class of attacks against complex CPUs, finding subliminal channels in optimization techniques...

WhatsApp Vulnerability Fixed
From Schneier on Security

WhatsApp Vulnerability Fixed

WhatsApp fixed a devastating vulnerability that allowed someone to remotely hack a phone by initiating a WhatsApp voice call. The recipient didn't even have to...

International Spy Museum Reopens
From Schneier on Security

International Spy Museum Reopens

The International Spy Museum has reopened in Washington, DC....

Upcoming Speaking Engagements
From Schneier on Security

Upcoming Speaking Engagements

This is a current list of where and when I am scheduled to speak: I'm speaking on "Securing a World of Physically Capable Computers" at Oxford University on Monday...

Cryptanalysis of SIMON-32/64
From Schneier on Security

Cryptanalysis of SIMON-32/64

A weird paper was posted on the Cryptology ePrint Archive (working link is via the Wayback Machine), claiming an attack against the NSA-designed cipher SIMON. You...

Reverse Engineering a Chinese Surveillance App
From Schneier on Security

Reverse Engineering a Chinese Surveillance App

Human Rights Watch has reverse engineered an app used by the Chinese police to conduct mass surveillance on Turkic Muslims in Xinjiang. The details are fascinating...

Friday Squid Blogging: Cephalopod Appreciation Society Event
From Schneier on Security

Friday Squid Blogging: Cephalopod Appreciation Society Event

Last Wednesday was a Cephalopod Appreciation Society event in Seattle. I missed it. As usual, you can also use this squid post to talk about the security stories...

Cryptanalyzing a Pair of Russian Encryption Algorithms
From Schneier on Security

Cryptanalyzing a Pair of Russian Encryption Algorithms

A pair of Russia-designed cryptographic algorithms -- the Kuznyechik block cipher and the Streebog hash function -- have the same flawed S-box that is almost certainly...

Another NSA Leaker Identified and Charged
From Schneier on Security

Another NSA Leaker Identified and Charged

In 2015, the Intercept started publishing "The Drone Papers," based on classified documents leaked by an unknown whistleblower. Today, someone who worked at the...

Amazon Is Losing the War on Fraudulent Sellers
From Schneier on Security

Amazon Is Losing the War on Fraudulent Sellers

Excellent article on fraudulent seller tactics on Amazon. The most prominent black hat companies for US Amazon sellers offer ways to manipulate Amazon's ranking...

Leaked NSA Hacking Tools
From Schneier on Security

Leaked NSA Hacking Tools

In 2016, a hacker group calling itself the Shadow Brokers released a trove of 2013 NSA hacking tools and related documents. Most people believe it is a front for...

Malicious MS Office Macro Creator
From Schneier on Security

Malicious MS Office Macro Creator

Evil Clippy is a tool for creating malicious Microsoft Office macros: At BlackHat Asia we released Evil Clippy, a tool which assists red teamers and security testers...

Locked Computers
From Schneier on Security

Locked Computers

This short video explains why computers regularly came with physical locks in the late 1980s and early 1990s. The one thing the video doesn't talk about is RAM...

First Physical Retaliation for a Cyberattack
From Schneier on Security

First Physical Retaliation for a Cyberattack

Israel has acknowledged that its recent airstrikes against Hamas were a real-time response to an ongoing cyberattack. From Twitter: CLEARED FOR RELEASE: We thwarted...

Protecting Yourself from Identity Theft
From Schneier on Security

Protecting Yourself from Identity Theft

I don't have a lot of good news for you. The truth is there's nothing we can do to protect our data from being stolen by cybercriminals and others. Ten years ago...

Friday Squid Blogging: Squid Skin "Inspires" New Thermal Sheeting
From Schneier on Security

Friday Squid Blogging: Squid Skin "Inspires" New Thermal Sheeting

Researchers are making space blankets using technology based on squid skin. Honestly, it's hard to tell how much squid is actually involved in this invention. As...

Cybersecurity for the Public Interest
From Schneier on Security

Cybersecurity for the Public Interest

The Crypto Wars have been waging off-and-on for a quarter-century. On one side is law enforcement, which wants to be able to break encryption, to access devices...

Why Isn't GDPR Being Enforced?
From Schneier on Security

Why Isn't GDPR Being Enforced?

Politico has a long article making the case that the lead GDPR regulator, Ireland, has too cozy a relationship with Silicon Valley tech companies to effectively...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account