acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

US Cyber Safety Review Board on the 2023 Microsoft Exchange Hack
From Schneier on Security

US Cyber Safety Review Board on the 2023 Microsoft Exchange Hack

US Cyber Safety Review Board released a report on the summer 2023 hack of Microsoft Exchange by China. It was a serious attack that From the executive summary: The...

Security Vulnerability of HTML Emails
From Schneier on Security

Security Vulnerability of HTML Emails

This is a newly discovered email vulnerability: The email your manager received and forwarded to you was something completely innocent, such as a potential customer...

Friday Squid Blogging: SqUID Bots
From Schneier on Security

Friday Squid Blogging: SqUID Bots

They’re AI warehouse robots. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting...

Maybe the Phone System Surveillance Vulnerabilities Will Be Fixed
From Schneier on Security

Maybe the Phone System Surveillance Vulnerabilities Will Be Fixed

It seems that the FCC might be fixing the vulnerabilities in SS7 and the Diameter protocol: On March 27 the commission asked telecommunications providers to weigh...

Surveillance by the New Microsoft Outlook App
From Schneier on Security

Surveillance by the New Microsoft Outlook App

The ProtonMail people are accusing Microsoft’s new Outlook for Windows app of conducting extensive surveillance on its users. It shares data with advertisers, a...

xz Utils Backdoor
From Schneier on Security

xz Utils Backdoor

The cybersecurity world got really lucky last week. An intentionally placed backdoor in xz Utils, an open-source compression utility, was pretty much accidentally...

Declassified NSA Newsletters
From Schneier on Security

Declassified NSA Newsletters

Through a 2010 FOIA request (yes, it took that long), we have copies of the NSA’s KRYPTOS Society Newsletter, “Tales of the Krypt,” from 1994 to 2003. There are...

Magic Security Dust
From Schneier on Security

Magic Security Dust

Adam Shostack is selling magic security dust. It’s about time someone is commercializing this essential technology.

Ross Anderson
From Schneier on Security

Ross Anderson

Ross Anderson unexpectedly passed away Thursday night in, I believe, his home in Cambridge. I can’t remember when I first met Ross. Of course it was before 2008...

Friday Squid Blogging: The Geopolitics of Eating Squid
From Schneier on Security

Friday Squid Blogging: The Geopolitics of Eating Squid

New York Times op-ed on the Chinese dominance of the squid industry: China’s domination in seafood has raised deep concerns among American fishermen, policymakers...

Lessons from a Ransomware Attack against the British Library
From Schneier on Security

Lessons from a Ransomware Attack against the British Library

You might think that libraries are kind of boring, but this self-analysis of a 2023 ransomware and extortion attack against the British Library is anything but.

On Secure Voting Systems
From Schneier on Security

On Secure Voting Systems

Andrew Appel shepherded a public comment—signed by twenty election cybersecurity experts, including myself—on best practices for ballot marking devices and vote...

AI and Trust
From Schneier on Security

AI and Trust

Watch the Video on YouTube.com A 15-minute talk by Bruce Schneier.

Licensing AI Engineers
From Schneier on Security

Licensing AI Engineers

The debate over professionalizing software engineers is decades old. (The basic idea is that, like lawyers and architects, there should be some professional licensing...

Friday Squid Blogging: New Species of Squid Discovered
From Schneier on Security

Friday Squid Blogging: New Species of Squid Discovered

A new species of squid was discovered, along with about a hundred other species. As usual, you can also use this squid post to talk about the security stories in...

Google Pays $10M in Bug Bounties in 2023
From Schneier on Security

Google Pays $10M in Bug Bounties in 2023

BleepingComputer has the details. It’s $2M less than in 2022, but it’s still a lot. The highest reward for a vulnerability report in 2023 was $113,337, while the...

Public AI as an Alternative to Corporate AI
From Schneier on Security

Public AI as an Alternative to Corporate AI

This mini-essay was my contribution to a round table on Power and Governance in the Age of AI.  It’s nothing I haven’t said here before, but for anyone who hasn...

Cheating Automatic Toll Booths by Obscuring License Plates
From Schneier on Security

Cheating Automatic Toll Booths by Obscuring License Plates

The Wall Street Journal is reporting on a variety of techniques drivers are using to obscure their license plates so that automatic readers can’t identify them...

AI and the Evolution of Social Media
From Schneier on Security

AI and the Evolution of Social Media

Oh, how the mighty have fallen. A decade ago, social media was celebrated for sparking democratic uprisings in the Arab world and beyond. Now front pages are splashed...

Drones and the US Air Force
From Schneier on Security

Drones and the US Air Force

Fascinating analysis of the use of drones on a modern battlefield—that is, Ukraine—and the inability of the US Air Force to react to this change. The F-35A certainly...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account