acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Ransomware and the Internet of Things
From Schneier on Security

Ransomware and the Internet of Things

As devastating as the latest widespread ransomware attacks have been, it's a problem with a solution. If your copy of Windows is relatively current and you've kept...

Hacking Fingerprint Readers with Master Prints
From Schneier on Security

Hacking Fingerprint Readers with Master Prints

There's interesting research on using a set of "master" digital fingerprints to fool biometric readers. The work is theoretical at the moment, but they might be...

ICE is Using Stingray to Track Illegal Immigrants
From Schneier on Security

ICE is Using Stingray to Track Illegal Immigrants

According to court documents, US Immigration and Customs Enforcement is using Stingray cell-site simulators to track illegal immigrants....

The Future of Ransomware
From Schneier on Security

The Future of Ransomware

Ransomware isn't new, but it's increasingly popular and profitable. The concept is simple: Your computer gets infected with a virus that encrypts your files until...

North Korean Cyberwar Capabilities
From Schneier on Security

North Korean Cyberwar Capabilities

Reuters has an article on North Korea's cyberwar capabilities, specifically "Unit 180." They're still not in the same league as the US, UK, Russia, China, and Israel...

Extending the Airplane Laptop Ban
From Schneier on Security

Extending the Airplane Laptop Ban

The Department of Homeland Security is rumored to be considering extending the current travel ban on large electronics for Middle Eastern flights to European ones...

Friday Squid Blogging: Giant Squid Caught Off the Coast of Ireland
From Schneier on Security

Friday Squid Blogging: Giant Squid Caught Off the Coast of Ireland

It's rare: Fishermen caught a 19-foot-long giant squid off the coast of Ireland on Monday, only the fifth to be seen there since 1673. Also the first in 22 years...

NSA Abandons "About" Searches
From Schneier on Security

NSA Abandons "About" Searches

Earlier this month, the NSA said that it would no longer conduct "about" searches of bulk communications data. This was the practice of collecting the communications...

WannaCry Ransomware
From Schneier on Security

WannaCry Ransomware

Criminals go where the money is, and cybercriminals are no exception. And right now, the money is in ransomware. ' It's a simple scam. Encrypt the victim's hard...

Human Rights Watch Needs an Information Security Director
From Schneier on Security

Human Rights Watch Needs an Information Security Director

I'm sure it pays less than the industry average, and the stakes are much higher than the average. But if you want to be a Director of Information Security that...

The US Senate Is Using Signal
From Schneier on Security

The US Senate Is Using Signal

The US Senate just approved Signal for staff use. Signal is a secure messaging app with no backdoor, and no large corporate owner who can be pressured to install...

Keylogger Found in HP Laptop Audio Drivers
From Schneier on Security

Keylogger Found in HP Laptop Audio Drivers

This is a weird story: researchers have discovered that an audio driver installed in some HP laptops includes a keylogger, which records all keystrokes to a local...

Did North Korea Write WannaCry?
From Schneier on Security

Did North Korea Write WannaCry?

The New York Times is reporting that evidence is pointing to North Korea as the author of the WannaCry ransomware. Note that there is no proof at this time, although...

NSA Brute-Force Keysearch Machine
From Schneier on Security

NSA Brute-Force Keysearch Machine

The Intercept published a story about a dedicated NSA brute-force keysearch machine being built with the help of New York University and IBM. It's based on a document...

Using Wi-Fi to Get 3D Images of Surrounding Location
From Schneier on Security

Using Wi-Fi to Get 3D Images of Surrounding Location

Interesting research: The radio signals emitted by a commercial Wi-Fi router can act as a kind of radar, providing images of the transmitter's environment, according...

The Quick vs. the Strong: Commentary on Cory Doctorow's Walkaway
From Schneier on Security

The Quick vs. the Strong: Commentary on Cory Doctorow's Walkaway

Technological advances change the world. That's partly because of what they are, but even more because of the social changes they enable. New technologies upend...

Yacht Security
From Schneier on Security

Yacht Security

Turns out, multi-million dollar yachts are no more secure than anything else out there: The ease with which ocean-going oligarchs or other billionaires can be hijacked...

Stealing Voice Prints
From Schneier on Security

Stealing Voice Prints

This article feels like hyperbole: The scam has arrived in Australia after being used in the United States and Britain. The scammer may ask several times "can you...

Interview with Ross Anderson
From Schneier on Security

Interview with Ross Anderson

Cybersecurity researcher Ross Anderson has a good interview on edge.org....

Securing Elections
From Schneier on Security

Securing Elections

Technology can do a lot more to make our elections more secure and reliable, and to ensure that participation in the democratic process is available to all. There...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account