acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Detecting Deepfake Picture Editing
From Schneier on Security

Detecting Deepfake Picture Editing

“Markpainting” is a clever technique to watermark photos in such a way that makes it easier to detect ML-based manipulation: An image owner can modify their image...

Information Flows and Democracy
From Schneier on Security

Information Flows and Democracy

Henry Farrell and I published a paper on fixing American democracy: “Rechanneling Beliefs: How Information Flows Hinder or Help Democracy.” It’s much easier for...

Friday Squid Blogging: Colossal Squid Photographed off the Coast of Antarctica
From Schneier on Security

Friday Squid Blogging: Colossal Squid Photographed off the Coast of Antarctica

Wow. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here.

Vulnerabilities in Weapons Systems
From Schneier on Security

Vulnerabilities in Weapons Systems

“If you think any of these systems are going to work as expected in wartime, you’re fooling yourself.” That was Bruce’s response at a conference hosted by U.S....

Friday Squid Blogging: Squids in Space
From Schneier on Security

Friday Squid Blogging: Squids in Space

NASA is sending baby bobtail squid into space. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered....

The Supreme Court Narrowed the CFAA
From Schneier on Security

The Supreme Court Narrowed the CFAA

In a 6-3 ruling, the Supreme Court just narrowed the scope of the Computer Fraud and Abuse Act: In a ruling delivered today, the court sided with Van Buren and...

Friday Squid Blogging: Video of Giant Squid Hunting Prey
From Schneier on Security

Friday Squid Blogging: Video of Giant Squid Hunting Prey

Fantastic video of a giant squid hunting at depths between 1,827 and 3,117 feet. This is a follow-on from this post. As usual, you can also use this squid posthere...

Security and Human Behavior (SHB) 2021
From Schneier on Security

Security and Human Behavior (SHB) 2021

Today is the second day of the fourteenth Workshop on Security and Human Behavior. The University of Cambridge is the host, but we’re all on Zoom. SHB is a small...

Upcoming Speaking Engagements
From Schneier on Security

Upcoming Speaking Engagements

This is a current list of where and when I am scheduled to speak: I’ll be part of a European Internet Forum virtual debate on June 17, 2021. The topic is “Decrypting...

The DarkSide Ransomware Gang
From Schneier on Security

The DarkSide Ransomware Gang

The New York Times has a long story on the DarkSide ransomware gang. A glimpse into DarkSide’s secret communications in the months leading up to the Colonial Pipeline...

Security Vulnerability in Apple’s Silicon “M1” Chip
From Schneier on Security

Security Vulnerability in Apple’s Silicon “M1” Chip

The website for the M1racles security vulnerability is an excellent demonstration that not all vulnerabilities are exploitable. Be sure to read the FAQ through...

The Misaligned Incentives for Cloud Security
From Schneier on Security

The Misaligned Incentives for Cloud Security

Russia’s Sunburst cyberespionage campaign, discovered late last year, impacted more than 100 large companies and US federal agencies, including the Treasury, Energy...

The Story of the 2011 RSA Hack
From Schneier on Security

The Story of the 2011 RSA Hack

Really good long article about the Chinese hacking of RSA, Inc. They were able to get copies of the seed values to the SecurID authentication token, a harbinger...

Friday Squid Blogging: Fossil of Squid Eating and Being Eaten
From Schneier on Security

Friday Squid Blogging: Fossil of Squid Eating and Being Eaten

We now have a fossil of a squid eating a crustacean while it is being eaten by a shark. As usual, you can also use this squid post to talk about the security stories...

New Disk Wiping Malware Targets Israel
From Schneier on Security

New Disk Wiping Malware Targets Israel

Apostle seems to be a new strain of malware that destroys data. In a post published Tuesday, SentinelOne researchers said they assessed with high confidence that...

AIs and Fake Comments
From Schneier on Security

AIs and Fake Comments

This month, the New York state attorney general issued a report on a scheme by “U.S. Companies and Partisans [to] Hack Democracy.” This wasn’t another attempt by...

Double-Encrypting Ransomware
From Schneier on Security

Double-Encrypting Ransomware

This seems to be a new tactic: Emsisoft has identified two distinct tactics. In the first, hackers encrypt data with ransomware A and then re-encrypt that data...

Bizarro Banking Trojan
From Schneier on Security

Bizarro Banking Trojan

Bizarro is a new banking trojan that is stealing financial information and crypto wallets. …the program can be delivered in a couple of ways­ — either via malicious...

Apple Censorship and Surveillance in China
From Schneier on Security

Apple Censorship and Surveillance in China

Good investigative reporting on how Apple is participating in and assisting with Chinese censorship and surveillance.

Adding a Russian Keyboard to Protect against Ransomware
From Schneier on Security

Adding a Russian Keyboard to Protect against Ransomware

A lot of Russian malware — the malware that targeted the Colonial Pipeline, for example — won’t install on computers with a Cyrillic keyboard installed. Brian Krebs...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account