acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Sensitive Super-Bowl Security Documents Left on an Airplane
From Schneier on Security

Sensitive Super-Bowl Security Documents Left on an Airplane

A CNN reporter found...

Friday Squid Blogging: Kraken Pie
From Schneier on Security

Friday Squid Blogging: Kraken Pie

Pretty, but contains no actual squid ingredients. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered...

Signed Malware
From Schneier on Security

Signed Malware

Stuxnet famously used legitimate digital certificates to sign its malware. A research paper from last year found that the practice is much more common than previously...

Jackpotting Attacks Against US ATMs
From Schneier on Security

Jackpotting Attacks Against US ATMs

Brian Krebs is reporting sophisticated jackpotting attacks against US ATMs. The attacker gains physical access to the ATM, plants malware using specialized electronics...

Israeli Scientists Accidentally Reveal Classified Information
From Schneier on Security

Israeli Scientists Accidentally Reveal Classified Information

According to this story (non-paywall English version here), Israeli scientists released some information to the public they shouldn't have. Defense establishment...

After Section 702 Reauthorization
From Schneier on Security

After Section 702 Reauthorization

For over a decade, civil libertarians have been fighting government mass surveillance of innocent Americans over the Internet. We've just lost an important battle...

Subway Elevators and Movie-Plot Threats
From Schneier on Security

Subway Elevators and Movie-Plot Threats

Local residents are opposing adding an elevator to a subway station because terrorists might use it to detonate a bomb. No, really. There's no actual threat analysis...

Locating Secret Military Bases via Fitness Data
From Schneier on Security

Locating Secret Military Bases via Fitness Data

In November, the company Strava released an anonymous data-visualization map showing all the fitness activity by everyone using the app. Over this weekend, someone...

Estimating the Cost of Internet Insecurity
From Schneier on Security

Estimating the Cost of Internet Insecurity

It's really hard to estimate the cost of an insecure Internet. Studies are all over the map. A methodical study by RAND is the best work I've seen at trying to...

Friday Squid Blogging: Squid that Mate, Die, and Then Sink
From Schneier on Security

Friday Squid Blogging: Squid that Mate, Die, and Then Sink

The mating and death characteristics of some squid are fascinating. Research paper. As usual, you can also use this squid post to talk about the security stories...

The Effects of the Spectre and Meltdown Vulnerabilities
From Schneier on Security

The Effects of the Spectre and Meltdown Vulnerabilities

On January 3, the world learned about a series of major security vulnerabilities in modern microprocessors. Called Spectre and Meltdown, these vulnerabilities were...

WhatsApp Vulnerability
From Schneier on Security

WhatsApp Vulnerability

A new vulnerability in WhatsApp has been discovered: ...the researchers unearthed far more significant gaps in WhatsApp's security: They say that anyone who controls...

Detecting Drone Surveillance with Traffic Analysis
From Schneier on Security

Detecting Drone Surveillance with Traffic Analysis

This is clever: Researchers at Ben Gurion University in Beer Sheva, Israel have built a proof-of-concept system for counter-surveillance against spy drones that...

New Malware Hijacks Cryptocurrency Mining
From Schneier on Security

New Malware Hijacks Cryptocurrency Mining

This is a clever attack. After gaining control of the coin-mining software, the malware replaces the wallet address the computer owner uses to collect newly minted...

Skygofree: New Government Malware for Android
From Schneier on Security

Skygofree: New Government Malware for Android

Kaspersky Labs is reporting on a new piece of sophisticated malware: We observed many web landing pages that mimic the sites of mobile operators and which are used...

Dark Caracal: Global Espionage Malware from Lebanon
From Schneier on Security

Dark Caracal: Global Espionage Malware from Lebanon

The EFF and Lookout are reporting on a new piece of spyware operating out of Lebanon. It primarily targets mobile devices compromised by fake secure messaging clients...

Friday Squid Blogging: Te Papa Colossal Squid Exhibition Is Being Renovated
From Schneier on Security

Friday Squid Blogging: Te Papa Colossal Squid Exhibition Is Being Renovated

The New Zealand home of the colossal squid exhibit is behind renovated. As usual, you can also use this squid post to talk about the security stories in the news...

Security Breaches Don't Affect Stock Price
From Schneier on Security

Security Breaches Don't Affect Stock Price

Interesting research: "Long-term market implications of data breaches, not," by Russell Lange and Eric W. Burger. Abstract: This report assesses the impact disclosure...

Student Cracks Inca Knot Code
From Schneier on Security

Student Cracks Inca Knot Code

Interesting....

Article from a Former Chinese PLA General on Cyber Sovereignty
From Schneier on Security

Article from a Former Chinese PLA General on Cyber Sovereignty

Interesting article by Major General Hao Yeli, Chinese People's Liberation Army (ret.), a senior advisor at the China International Institute for Strategic Society...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account