acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Ransomware Meets Multi-level Marketing
From Schneier on Security

Ransomware Meets Multi-level Marketing

A new ransomware, Popcorn Time, gives users the option of infecting others in lieu of paying the ransom. Related: a good general article on ransomware....

Cybersecurity Fantasy Role-Playing Game
From Schneier on Security

Cybersecurity Fantasy Role-Playing Game

It's called Cryptomancer. Think computer hacking plus magic. I know nothing about it, but it feels reminiscent of Shadowrun. Reddit thread. RPG.net thread....

Friday Squid Blogging:  Electronic Screens Inspired by Squid
From Schneier on Security

Friday Squid Blogging: Electronic Screens Inspired by Squid

Squid-inspired electronic screens. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Enigma Machine Sold for Almost Half a Million Dollars
From Schneier on Security

Enigma Machine Sold for Almost Half a Million Dollars

A fully functional four-rotor Enigma machine sold for $463,500. Wow....

New NSA Stories
From Schneier on Security

New NSA Stories

Le Monde and the Intercept are reporting about NSA spying in Africa, and NSA spying on in-flight mobile phone calls -- both from the Snowden documents....

WWW Malware Hides in Images
From Schneier on Security

WWW Malware Hides in Images

There's new malware toolkit that uses stegaography to hide in images: For the past two months, a new exploit kit has been serving malicious code hidden in the pixels...

International Phone Fraud Tactics
From Schneier on Security

International Phone Fraud Tactics

This article outlines two different types of international phone fraud. The first can happen when you call an expensive country like Cuba: My phone call never actually...

Voynich Manuscript Facsimile Published
From Schneier on Security

Voynich Manuscript Facsimile Published

Yale University Press has published a facsimile of the Voynich Manuscript. The manuscript is also available online....

Guessing Credit Card Security Details
From Schneier on Security

Guessing Credit Card Security Details

Researchers have found that they can guess various credit-card-number security details by spreading their guesses around multiple websites so as not to trigger...

A 50-Foot Squid Has Not been Found in New Zealand
From Schneier on Security

A 50-Foot Squid Has Not been Found in New Zealand

A 50-foot squid has not been found in New Zealand. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered...

Auditing Elections for Signs of Hacking
From Schneier on Security

Auditing Elections for Signs of Hacking

Excellent essay pointing out that election security is a national security issue, and that we need to perform random ballot audits on every future election: The...

Analyzing WeChat
From Schneier on Security

Analyzing WeChat

Citizen Lab has analyzed how censorship works in the Chinese chat app WeChat: Key Findings: Keyword filtering on WeChat is only enabled for users with accounts...

DigiTally
From Schneier on Security

DigiTally

Ross Anderson describes DigiTally, a secure payments system for use in areas where there is little or no network connectivity....

You, Too, Can Rent the Murai Botnet
From Schneier on Security

You, Too, Can Rent the Murai Botnet

You can rent a 400,000-computer Murai botnet and DDoS anyone you like. BoingBoing post. Slashdot thread....

San Francisco Transit System Target of Ransomware
From Schneier on Security

San Francisco Transit System Target of Ransomware

It's really bad. The ticket machines were hacked. Over the next couple of years, I believe we are going to see the downside of our headlong rush to put everything...

Friday Squid Blogging: Striped Pyjama Squid
From Schneier on Security

Friday Squid Blogging: Striped Pyjama Squid

Here's a nice picture of one of the few known poisonous squids. As usual, you can also use this squid post to talk about the security stories in the news that I...

Hacking and the 2016 Presidential Election
From Schneier on Security

Hacking and the 2016 Presidential Election

Was the 2016 presidential election hacked? It's hard to tell. There were no obvious hacks on Election Day, but new reports have raised the question of whether voting...

Securing Communications in a Trump Administration
From Schneier on Security

Securing Communications in a Trump Administration

Susan Landau has an excellent essay on why it's more important than ever to have backdoor-free encryption on our computer and communications systems. Protecting...

Headphones as Microphones
From Schneier on Security

Headphones as Microphones

Surprising no one who has been following this sort of thing, headphones can be used as microphones....

Government Propaganda on Social Media
From Schneier on Security

Government Propaganda on Social Media

Vice Motherboard has an interesting article about governments using social-media platforms for propaganda and surveillance, and the companies that are supporting...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account