acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

The Hacker Tool to Get Personal Data from Credit Bureaus
From Schneier on Security

The Hacker Tool to Get Personal Data from Credit Bureaus

The new site 404 Media has a good article on how hackers are cheaply getting personal information from credit bureaus: This is the result of a secret weapon criminals...

Cryptocurrency Startup Loses Encryption Key for Electronic Wallet
From Schneier on Security

Cryptocurrency Startup Loses Encryption Key for Electronic Wallet

The cryptocurrency fintech startup Prime Trust lost the encryption key to its hardware wallet—and the recovery key—and therefore $38.9 million. It is now in bankruptcy...

Inconsistencies in the Common Vulnerability Scoring System (CVSS)
From Schneier on Security

Inconsistencies in the Common Vulnerability Scoring System (CVSS)

Interesting research: Shedding Light on CVSS Scoring Inconsistencies: A User-Centric Study on Evaluating Widespread Security Vulnerabilities Abstract: The Common...

Spyware Vendor Hacked
From Schneier on Security

Spyware Vendor Hacked

A Brazilian spyware app vendor was hacked by activists: In an undated note seen by TechCrunch, the unnamed hackers described how they found and exploited several...

Own Your Own Government Surveillance Van
From Schneier on Security

Own Your Own Government Surveillance Van

A used government surveillance van is for sale in Chicago: So how was this van turned into a mobile spying center? Well, let’s start with how it has more LCD monitors...

When Apps Go Rogue
From Schneier on Security

When Apps Go Rogue

Interesting story of an Apple Macintosh app that went rogue. Basically, it was a good app until one particular update…when it went bad. With more official macOS...

Identity Theft from 1965 Uncovered through Face Recognition
From Schneier on Security

Identity Theft from 1965 Uncovered through Face Recognition

Interesting story: Napoleon Gonzalez, of Etna, assumed the identity of his brother in 1965, a quarter century after his sibling’s death as an infant, and used...

Remotely Stopping Polish Trains
From Schneier on Security

Remotely Stopping Polish Trains

Turns out that it’s easy to broadcast radio commands that force Polish trains to stop: …the saboteurs appear to have sent simple so-called “radio-stop” commands...

Hacking Food Labeling Laws
From Schneier on Security

Hacking Food Labeling Laws

This article talks about new Mexican laws about food labeling, and the lengths to which food manufacturers are going to ensure that they are not effective. There...

Parmesan Anti-Forgery Protection
From Schneier on Security

Parmesan Anti-Forgery Protection

The Guardian is reporting about microchips in wheels of Parmesan cheese as an anti-forgery measure.

Applying AI to License Plate Surveillance
From Schneier on Security

Applying AI to License Plate Surveillance

License plate scanners aren’t new. Neither is using them for bulk surveillance. What’s new is that AI is being used on the data, identifying “suspicious” vehicle...

White House Announces AI Cybersecurity Challenge
From Schneier on Security

White House Announces AI Cybersecurity Challenge

At Black Hat last week, the White House announced an AI Cyber Challenge. Gizmodo reports: The new AI cyber challenge (which is being abbreviated “AIxCC”) will have...

Friday Squid Blogging: Squid Brand Fish Sauce
From Schneier on Security

Friday Squid Blogging: Squid Brand Fish Sauce

Squid Brand is a Thai company that makes fish sauce: It is part of Squid Brand’s range of “personalized healthy fish sauces” that cater to different consumer groups...

Bots Are Better than Humans at Solving CAPTCHAs
From Schneier on Security

Bots Are Better than Humans at Solving CAPTCHAs

Interesting research: “An Empirical Study & Evaluation of Modern CAPTCHAs“: Abstract: For nearly two decades, CAPTCHAS have been widely used as a means of protection...

Detecting “Violations of Social Norms” in Text with AI
From Schneier on Security

Detecting “Violations of Social Norms” in Text with AI

Researchers are trying to use AI to detect “social norms violations.” Feels a little sketchy right now, but this is the sort of thing that AIs will get better at...

UK Electoral Commission Hacked
From Schneier on Security

UK Electoral Commission Hacked

The UK Electoral Commission discovered last year that it was hacked the year before. That’s fourteen months between the hack and the discovery. It doesn’t know...

Friday Squid Blogging: NIWA Annual Squid Survey
From Schneier on Security

Friday Squid Blogging: NIWA Annual Squid Survey

Results from the National Institute of Water and Atmospheric Research Limited annual squid survey: This year, the team unearthed spectacular large hooked squids...

The Inability to Simultaneously Verify Sentience, Location, and Identity
From Schneier on Security

The Inability to Simultaneously Verify Sentience, Location, and Identity

Really interesting “systematization of knowledge” paper: “SoK: The Ghost Trilemma” Abstract: Trolls, bots, and sybils distort online discourse and compromise the...

Cryptographic Flaw in Libbitcoin Explorer Cryptocurrency Wallet
From Schneier on Security

Cryptographic Flaw in Libbitcoin Explorer Cryptocurrency Wallet

Cryptographic flaws still matter. Here’s a flaw in the random-number generator used to create private keys. The seed has only 32 bits of entropy. Seems like this...

Using Machine Learning to Detect Keystrokes
From Schneier on Security

Using Machine Learning to Detect Keystrokes

Researchers have trained a ML model to detect keystrokes by sound with 95% accuracy. “A Practical Deep Learning-Based Acoustic Side Channel Attack on Keyboards...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account