acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

TajMahal Spyware
From Schneier on Security

TajMahal Spyware

Kaspersky has released details about a sophisticated nation-state spyware it calls TajMahal: The TajMahal framework's 80 modules, Shulmin says, comprise not only...

How the Anonymous Artist Bansky Authenticates His or Her Work
From Schneier on Security

How the Anonymous Artist Bansky Authenticates His or Her Work

Interesting scheme: It all starts off with a fairly bog standard gallery style certificate. Details of the work, the authenticating agency, a bit of embossing and...

Hey Secret Service: Don't Plug Suspect USB Sticks into Random Computers
From Schneier on Security

Hey Secret Service: Don't Plug Suspect USB Sticks into Random Computers

I just noticed this bit from the incredibly weird story of the Chinese woman arrested at Mar-a-Lago: Secret Service agent Samuel Ivanovich, who interviewed Zhang...

Ghidra: NSA's Reverse-Engineering Tool
From Schneier on Security

Ghidra: NSA's Reverse-Engineering Tool

Last month, the NSA released Ghidra, a software reverse-engineering tool. Early reactions are uniformly positive. Three news articles....

Friday Squid Blogging: Fried Squid Recipe
From Schneier on Security

Friday Squid Blogging: Fried Squid Recipe

This is an easy fried squid recipe with saffron and agrodolce. As usual, you can also use this squid post to talk about the security stories in the news that I...

Unhackable Cryptography?
From Schneier on Security

Unhackable Cryptography?

A recent article overhyped the release of EverCrypt, a cryptography library created using formal methods to prove security against specific attacks. The Quantum...

Former Mozilla CTO Harassed at the US Border
From Schneier on Security

Former Mozilla CTO Harassed at the US Border

This is a pretty awful story of how Andreas Gal, former Mozilla CTO and US citizen, was detained and threatened at the US border. CBP agents demanded that he unlock...

Adversarial Machine Learning against Tesla's Autopilot
From Schneier on Security

Adversarial Machine Learning against Tesla's Autopilot

Researchers have been able to fool Tesla's autopilot in a variety of ways, including convincing it to drive into oncoming traffic. It requires the placement of...

How Political Campaigns Use Personal Data
From Schneier on Security

How Political Campaigns Use Personal Data

Really interesting report from Tactical Tech. Data-driven technologies are an inevitable feature of modern political campaigning. Some argue that they are a welcome...

Hacking Instagram to Get Free Meals in Exchange for Positive Reviews
From Schneier on Security

Hacking Instagram to Get Free Meals in Exchange for Positive Reviews

This is a fascinating hack: In today's digital age, a large Instagram audience is considered a valuable currency. I had also heard through the grapevine that I...

Recovering Smartphone Typing from Microphone Sounds
From Schneier on Security

Recovering Smartphone Typing from Microphone Sounds

Yet another side-channel attack on smartphones: "Hearing your touch: A new acoustic side channel on smartphones," by Ilia Shumailov, Laurent Simon, Jeff Yan, and...

Friday Squid Blogging: Restoring the Giant Squid at the Museum of Natural History
From Schneier on Security

Friday Squid Blogging: Restoring the Giant Squid at the Museum of Natural History

It is traveling to Paris. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting...

NSA-Inspired Vulnerability Found in Huawei Laptops
From Schneier on Security

NSA-Inspired Vulnerability Found in Huawei Laptops

This is an interesting story of a serious vulnerability in a Huawei driver that Microsoft found. The vulnerability is similar in style to the NSA's DOUBLEPULSAR...

Malware Installed in Asus Computers Through Hacked Update Process
From Schneier on Security

Malware Installed in Asus Computers Through Hacked Update Process

Kaspersky Labs is reporting on a new supply chain attack they call "Shadowhammer." In January 2019, we discovered a sophisticated supply chain attack involving...

Programmers Who Don't Understand Security Are Poor at Security
From Schneier on Security

Programmers Who Don't Understand Security Are Poor at Security

A university study confirmed the obvious: if you pay a random bunch of freelance programmers a small amount of money to write security software, they're not going...

Personal Data Left on Used Laptops
From Schneier on Security

Personal Data Left on Used Laptops

A recent experiment found all sorts of personal data left on used laptops and smartphones. This should come as no surprise. Simson Garfinkel performed the same...

Mail Fishing
From Schneier on Security

Mail Fishing

Not email, paper mail: Thieves, often at night, use string to lower glue-covered rodent traps or bottles coated with an adhesive down the chute of a sidewalk mailbox...

Friday Squid Blogging: New Research on Squid Camouflage
From Schneier on Security

Friday Squid Blogging: New Research on Squid Camouflage

From the New York Times: Now, a paper published last week in Nature Communications suggests that their chromatophores, previously thought to be mainly pockets of...

Enigma, Typex, and Bombe Simulators
From Schneier on Security

Enigma, Typex, and Bombe Simulators

GCHQ has put simulators for the Enigma, Typex, and Bombe on the Internet. News article....

First Look Media Shutting Down Access to Snowden NSA Archives
From Schneier on Security

First Look Media Shutting Down Access to Snowden NSA Archives

The Daily Beast is reporting that First Look Media -- home of The Intercept and Glenn Greenwald -- is shutting down access to the Snowden archives. The Intercept...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account