acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Supply Chain Attack against Courtroom Software
From Schneier on Security

Supply Chain Attack against Courtroom Software

No word on how this backdoor was installed: A software maker serving more than 10,000 courtrooms throughout the world hosted an application update containing a...

Privacy Implications of Tracking Wireless Access Points
From Schneier on Security

Privacy Implications of Tracking Wireless Access Points

Brian Krebs reports on research into geolocating routers: Apple and the satellite-based broadband service Starlink each recently took steps to address new research...

Lattice-Based Cryptosystems and Quantum Cryptanalysis
From Schneier on Security

Lattice-Based Cryptosystems and Quantum Cryptanalysis

Quantum computers are probably coming, though we don’t know when—and when they arrive, they will, most likely, be able to break our standard public-key cryptography...

Friday Squid Blogging: Dana Squid Attacking Camera
From Schneier on Security

Friday Squid Blogging: Dana Squid Attacking Camera

Fantastic footage of a Dana squid attacking a camera at a depth of about a kilometer. As usual, you can also use this squid post to talk about the security stories...

On the Zero-Day Market
From Schneier on Security

On the Zero-Day Market

New paper: “Zero Progress on Zero Days: How the Last Ten Years Created the Modern Spyware Market“: Abstract: Spyware makes surveillance simple. The last ten years...

Personal AI Assistants and Privacy
From Schneier on Security

Personal AI Assistants and Privacy

Microsoft is trying to create a personal digital assistant: At a Build conference event on Monday, Microsoft revealed a new AI-powered feature called “Recall” for...

Unredacting Pixelated Text
From Schneier on Security

Unredacting Pixelated Text

Experiments in unredacting text that has been pixelated.

Detecting Malicious Trackers
From Schneier on Security

Detecting Malicious Trackers

From Slashdot: Apple and Google have launched a new industry standard called “Detecting Unwanted Location Trackers” to combat the misuse of Bluetooth trackers....

IBM Sells Cybersecurity Group
From Schneier on Security

IBM Sells Cybersecurity Group

IBM is selling its QRadar product suite to Palo Alto Networks, for an undisclosed—but probably surprisingly small—sum. I have a personal connection to this. Inbought...

Friday Squid Blogging: Emotional Support Squid
From Schneier on Security

Friday Squid Blogging: Emotional Support Squid

When asked what makes this an “emotional support squid” and not just another stuffed animal, its creator says: They’re emotional support squid because they’re large...

FBI Seizes BreachForums Website
From Schneier on Security

FBI Seizes BreachForums Website

The FBI has seized the BreachForums website, used by ransomware criminals to leak stolen corporate data. If law enforcement has gained access to the hacking forum...

Zero-Trust DNS
From Schneier on Security

Zero-Trust DNS

Microsoft is working on a promising-looking protocol to lock down DNS. ZTDNS aims to solve this decades-old problem by integrating the Windows DNS engine with...

Upcoming Speaking Engagements
From Schneier on Security

Upcoming Speaking Engagements

This is a current list of where and when I am scheduled to speak: I’m giving a webinar via Zoom on Wednesday, May 22, at 11:00 AM ET. The topic is “Should the“...

Another Chrome Vulnerability
From Schneier on Security

Another Chrome Vulnerability

Google has patched another Chrome zero-day: On Thursday, Google said an anonymous source notified it of the vulnerability. The vulnerability carries a severity...

Friday Squid Blogging: Squid Mating Strategies
From Schneier on Security

Friday Squid Blogging: Squid Mating Strategies

Some squids are “consorts,” others are “sneakers.” The species is healthiest when individuals have different strategies randomly. As usual, you can also use this...

New Attack Against Self-Driving Car AI
From Schneier on Security

New Attack Against Self-Driving Car AI

This is another attack that convinces the AI to ignore road signs: Due to the way CMOS cameras operate, rapidly changing light from fast flashing diodes can be...

How Criminals Are Using Generative AI
From Schneier on Security

How Criminals Are Using Generative AI

There’s a new report on how criminals are using generative AI tools: Key Takeaways: Adoption rates of AI technologies among criminals lag behind the rates of...

New Attack on VPNs
From Schneier on Security

New Attack on VPNs

This attack has been feasible for over two decades: Researchers have devised an attack against nearly all virtual private network applications that forces them...

New Lawsuit Attempting to Make Adversarial Interoperability Legal
From Schneier on Security

New Lawsuit Attempting to Make Adversarial Interoperability Legal

Lots of complicated details here: too many for me to summarize well. It involves an obscure Section 230 provision—and an even more obscure typo. Read this.

Friday Squid Blogging: Squid Purses
From Schneier on Security

Friday Squid Blogging: Squid Purses

Squid-shaped purses for sale. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account