acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Security Flaws in 4G VoLTE
From Schneier on Security

Security Flaws in 4G VoLTE

Research paper: "Subscribers remote geolocation and tracking using 4G VoLTE enabled Android phone," by Patrick Ventuzelo, Olivier Le Moal, and Thomas Coudray. Abstract...

Chelsea Manning Profiled in New York Times Magazine
From Schneier on Security

Chelsea Manning Profiled in New York Times Magazine

Interesting reading....

Healthcare Industry Cybersecurity Report
From Schneier on Security

Healthcare Industry Cybersecurity Report

New US government report: "Report on Improving Cybersecurity in the Health Care Industry." It's pretty scathing, but nothing in it will surprise regular readers...

Friday Squid Blogging: Sex Is Traumatic for the Female Dumpling Squid
From Schneier on Security

Friday Squid Blogging: Sex Is Traumatic for the Female Dumpling Squid

The more they mate, the sooner they die. Academic paper (paywall). News article. As usual, you can also use this squid post to talk about the security stories in...

NSA Document Outlining Russian Attempts to Hack Voter Rolls
From Schneier on Security

NSA Document Outlining Russian Attempts to Hack Voter Rolls

This week brought new public evidence about Russian interference in the 2016 election. On Monday, the Intercept published a top-secret National Security Agency...

Safety and Security and the Internet of Things
From Schneier on Security

Safety and Security and the Internet of Things

Ross Anderson blogged about his new paper on security and safety concerns about the Internet of Things. (See also this short video.) It's very much along the lines...

Surveillance Intermediaries
From Schneier on Security

Surveillance Intermediaries

Interesting law-journal article: "Surveillance Intermediaries," by Alan Z. Rozenshtein. Abstract:Apple's 2016 fight against a court order commanding it to help...

Spear Phishing Attacks
From Schneier on Security

Spear Phishing Attacks

Really interesting research: "Unpacking Spear Phishing Susceptibility," by Zinaida Benenson, Freya Gassmann, and Robert Landwirth. Abstract: We report the results...

CIA's Pandemic Toolkit
From Schneier on Security

CIA's Pandemic Toolkit

WikiLeaks is still dumping CIA cyberweapons on the Internet. Its latest dump is something called "Pandemic": The Pandemic leak does not explain what the CIA's initial...

Friday Squid Blogging: Squid as Prey
From Schneier on Security

Friday Squid Blogging: Squid as Prey

There's lots of video of squid as undersea predators. This is one of the few instances of squid as prey (from a deep submersible in the Pacific): "We saw brittle...

WannaCry and Vulnerabilities
From Schneier on Security

WannaCry and Vulnerabilities

There is plenty of blame to go around for the WannaCry ransomware that spread throughout the Internet earlier this month, disrupting work at hospitals, factories...

Passwords at the Border
From Schneier on Security

Passwords at the Border

The password-manager 1Password has just implemented a travel mode that tries to protect users while crossing borders. It doesn't make much sense. To enable it,...

Post-Quantum RSA
From Schneier on Security

Post-Quantum RSA

Interesting research on a version of RSA that is secure against a quantum computer: Post-quantum RSA Daniel J. Bernstein, Nadia Heninger, Paul Lou, and Luke Valenta...

Inmates Secretly Build and Network Computers while in Prison
From Schneier on Security

Inmates Secretly Build and Network Computers while in Prison

This is kind of amazing: Inmates at a medium-security Ohio prison secretly assembled two functioning computers, hid them in the ceiling, and connected them to the...

Who Are the Shadow Brokers?
From Schneier on Security

Who Are the Shadow Brokers?

In 2013, a mysterious group of hackers that calls itself the Shadow Brokers stole a few disks full of NSA secrets. Since last summer, they've been dumping these...

Tainted Leaks
From Schneier on Security

Tainted Leaks

Last year, I wrote about the potential for doxers to alter documents before they leaked them. It was a theoretical threat when I wrote it, but now Citizen Lab has...

Friday Squid Blogging: Squid and Chips
From Schneier on Security

Friday Squid Blogging: Squid and Chips

The excellent Montreal chef Marc-Olivier Frappier, of Joe Beef fame, has created a squid and chips dish for Brit & Chips restaurant. As usual, you can also use...

Forbes Names Beyond Fear as One of the "13 Books Technology Executives Should Have On Their Shelves"
From Schneier on Security

Forbes Names Beyond Fear as One of the "13 Books Technology Executives Should Have On Their Shelves"

It's a good list....

Hacking the Galaxy S8's Iris Biometric
From Schneier on Security

Hacking the Galaxy S8's Iris Biometric

It was easy: The hackers took a medium range photo of their subject with a digital camera's night mode, and printed the infrared image. Then, presumably to give...

Security and Human Behavior (SHB 2017)
From Schneier on Security

Security and Human Behavior (SHB 2017)

I'm in Cambridge University, at the tenth Workshop on Security and Human Behavior. SHB is a small invitational gathering of people studying various aspects of the...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account