acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Self-Propagating Smart Light Bulb Worm
From Schneier on Security

Self-Propagating Smart Light Bulb Worm

This is exactly the sort of Internet-of-Things attack that has me worried: "IoT Goes Nuclear: Creating a ZigBee Chain Reaction" by Eyal Ronen, Colin OFlynn, Adi...

Election-Day Humor
From Schneier on Security

Election-Day Humor

This was written in 2004, but still holds true today....

Lessons From the Dyn DDoS Attack
From Schneier on Security

Lessons From the Dyn DDoS Attack

A week ago Friday, someone took down numerous popular websites in a massive distributed denial-of-service (DDoS) attack against the domain name provider Dyn. DDoS...

Firefox Removing Battery Status API
From Schneier on Security

Firefox Removing Battery Status API

Firefox is removing the battery status API, citing privacy concerns. Here's the paper that described those concerns: Abstract. We highlight privacy risks associated...

Research into IoT Security Is Finally Legal
From Schneier on Security

Research into IoT Security Is Finally Legal

For years, the DMCA has been used to stifle legitimate research into the security of embedded systems. Finally, the research exemption to the DMCA is in effect...

Friday Squid Blogging: Whale Hunts Squid
From Schneier on Security

Friday Squid Blogging: Whale Hunts Squid

A sperm whale has been sighted in Monterey Bay, hunting squid. As usual, you can also use this squid post to talk about the security stories in the news that I...

Hacking in the Movies
From Schneier on Security

Hacking in the Movies

New Atlas has a great three-part feature on the history of hacking as portrayed in films, including video clips. The 1980s. The 1990s. The 2000s....

Google Linking Anonymous Browser Tracking with Identifiable Tracking
From Schneier on Security

Google Linking Anonymous Browser Tracking with Identifiable Tracking

Google's new ways to violate your privacy and -- more importantly -- how to opt out....

Teaching a Neural Network to Encrypt
From Schneier on Security

Teaching a Neural Network to Encrypt

Researchers have trained a neural network to encrypt its communications. In their experiment, computers were able to make their own form of encryption using machine...

Free Cybersecurity MOOC from F-Secure and the University of Finland
From Schneier on Security

Free Cybersecurity MOOC from F-Secure and the University of Finland

Looks interesting. Finnish residents can take it for credit....

Edward Snowden's Boss at Booz Allen Hamilton Speaks
From Schneier on Security

Edward Snowden's Boss at Booz Allen Hamilton Speaks

Interesting. I have no idea how much of it to believe....

Another Shadow Brokers Leak
From Schneier on Security

Another Shadow Brokers Leak

There's another leak of NSA hacking tools and data from the Shadow Brokers. This one includes a list of hacked sites. According to analyses from researchers here...

Card Game Based on the Iterated Prisoner's Dilemma
From Schneier on Security

Card Game Based on the Iterated Prisoner's Dilemma

Interesting....

How to Avoid Kidnapping Children on Halloween
From Schneier on Security

How to Avoid Kidnapping Children on Halloween

A useful guide....

A High-End Card-Reading Device
From Schneier on Security

A High-End Card-Reading Device

An impressive Chinese device that automatically reads marked cards in order to cheat at poker and other card games....

Friday Squid Blogging: Squid Nebula
From Schneier on Security

Friday Squid Blogging: Squid Nebula

Beautiful. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Eavesdropping on Typing Over Voice-Over-IP
From Schneier on Security

Eavesdropping on Typing Over Voice-Over-IP

Interesting research: "Don't Skype & Type! Acoustic Eavesdropping in Voice-Over-IP": Abstract: Acoustic emanations of computer keyboards represent a serious privacy...

Hardware Bit-Flipping Attacks in Practice
From Schneier on Security

Hardware Bit-Flipping Attacks in Practice

A year and a half ago, I wrote about hardware bit-flipping attacks, which were then largely theoretical. Now, they can be used to root Android phones: The breakthrough...

How Powell's and Podesta's E-mail Accounts Were Hacked
From Schneier on Security

How Powell's and Podesta's E-mail Accounts Were Hacked

It was a phishing attack....

OPM Attack
From Schneier on Security

OPM Attack

Good long article on the 2015 attack against the US Office of Personnel Management....
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account