acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Using Wi-FI to See through Walls
From Schneier on Security

Using Wi-FI to See through Walls

This technique measures device response time to determine distance: The scientists tested the exploit by modifying an off-the-shelf drone to create a flying scanning...

The Conviction of Uber’s Chief Security Officer
From Schneier on Security

The Conviction of Uber’s Chief Security Officer

I have been meaning to write about Joe Sullivan, Uber’s former Chief Security Officer. He was convicted of crimes related to covering up a cyberattack against Uber...

Friday Squid Blogging: Newfoundland Giant Squid Sculpture
From Schneier on Security

Friday Squid Blogging: Newfoundland Giant Squid Sculpture

In 1878, a 55-foot-long giant squid washed up on the shores of Glover’s Harbour, Newfoundland. It’s the largest giant squid ever recorded—although scientists now...

NSA on Supply Chain Security
From Schneier on Security

NSA on Supply Chain Security

The NSA (together with CISA) has published a long report on supply-chain security: “Securing the Software Supply Chain: Recommended Practices Guide for Suppliers...

Iran’s Digital Surveillance Tools Leaked
From Schneier on Security

Iran’s Digital Surveillance Tools Leaked

It’s Iran’s turn to have its digital surveillance tools leaked: According to these internal documents, SIAM is a computer system that works behind the scenes of...

Apple Only Commits to Patching Latest OS Version
From Schneier on Security

Apple Only Commits to Patching Latest OS Version

People have suspected this for a while, but Apple has made it official. It only commits to fully patching the latest version of its OS, even though it claims to...

Friday Squid Blogging: Chinese Squid Fishing
From Schneier on Security

Friday Squid Blogging: Chinese Squid Fishing

China claims that it is “engaging in responsible squid fishing”: Chen Xinjun, dean of the College of Marine Sciences at Shanghai Ocean University, made the remarks...

Critical Vulnerability in Open SSL
From Schneier on Security

Critical Vulnerability in Open SSL

There are no details yet, but it’s really important that you patch Open SSL 3.x when the new version comes out on Tuesday. How bad is “Critical”? According tocritical...

Australia Increases Fines for Massive Data Breaches
From Schneier on Security

Australia Increases Fines for Massive Data Breaches

After suffering two large, and embarrassing, data breaches in recent weeks, the Australian government increased the fine for serious data breaches from $2.2 million...

On the Randomness of Automatic Card Shufflers
From Schneier on Security

On the Randomness of Automatic Card Shufflers

Many years ago, Matt Blaze and I talked about getting our hands on a casino-grade automatic shuffler and looking for vulnerabilities. We never did it—I remember...

Friday Squid Blogging: The Reproductive Habits of Giant Squid
From Schneier on Security

Friday Squid Blogging: The Reproductive Habits of Giant Squid

Interesting: A recent study on giant squid that have washed ashore along the Sea of Japan coast has raised the possibility that the animal has a different reproductive...

Adversarial ML Attack that Secretly Gives a Language Model a Point of View
From Schneier on Security

Adversarial ML Attack that Secretly Gives a Language Model a Point of View

Machine learning security is extraordinarily difficult because the attacks are so varied—and it seems that each new one is weirder than the next. Here’s the latest...

Interview with Signal’s New President
From Schneier on Security

Interview with Signal’s New President

Long and interesting interview with Signal’s new president, Meredith Whittaker: WhatsApp uses the Signal encryption protocol to provide encryption for its messages...

Museum Security
From Schneier on Security

Museum Security

Interesting interview: Banks don’t take millions of dollars and put them in plastic bags and hang them on the wall so everybody can walk right up to them. But we...

Qatar Spyware
From Schneier on Security

Qatar Spyware

Everyone visiting Qatar for the World Cup needs to install spyware on their phone. Everyone travelling to Qatar during the football World Cup will be asked to...

Hacking Automobile Keyless Entry Systems
From Schneier on Security

Hacking Automobile Keyless Entry Systems

Suspected members of a European car-theft ring have been arrested: The criminals targeted vehicles with keyless entry and start systems, exploiting the technology...

Friday Squid Blogging: On Squid Ink
From Schneier on Security

Friday Squid Blogging: On Squid Ink

It’s aimed at children, but it’s a good primer. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered...

Upcoming Speaking Engagements
From Schneier on Security

Upcoming Speaking Engagements

This is a current list of where and when I am scheduled to speak: I’m speaking at the World Ethical Data Forum, online, October 26-28, 2022. I’m speaking at the...

Regulating DAOs
From Schneier on Security

Regulating DAOs

In August, the US Treasury’s Office of Foreign Assets Control (OFAC) sanctioned the cryptocurrency platform Tornado Cash, a virtual currency “mixer” designed to...

Check What Information Your Browser Leaks
From Schneier on Security

Check What Information Your Browser Leaks

These two sites tell you what sorts of information you’re leaking from your browser.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account