acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Friday Squid Blogging: Squid Cartoon
From Schneier on Security

Friday Squid Blogging: Squid Cartoon

Squid ink. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here...

Hacking Digitally Signed PDF Files
From Schneier on Security

Hacking Digitally Signed PDF Files

Interesting paper: “Shadow Attacks: Hiding and Replacing Content in Signed PDFs“: Abstract: Digitally signed PDFs are used in contracts and invoices to guarantee...

No, RSA Is Not Broken
From Schneier on Security

No, RSA Is Not Broken

I have been seeing this paper by cryptographer Peter Schnorr making the rounds: “Fast Factoring Integers by SVP Algorithms.” It describes a new factoring method...

Four Microsoft Exchange Zero-Days Exploited by China
From Schneier on Security

Four Microsoft Exchange Zero-Days Exploited by China

Microsoft has issued an emergency Microsoft Exchange patch to fix four zero-day vulnerabilities currently being exploited by China.

Encoded Message in the Perseverance Mars Lander’s Parachute
From Schneier on Security

Encoded Message in the Perseverance Mars Lander’s Parachute

NASA made an oblique reference to a coded message in the color pattern of the Perseverance Mars Lander ‘s parachute. More information.

Chinese Hackers Stole an NSA Windows Exploit in 2014
From Schneier on Security

Chinese Hackers Stole an NSA Windows Exploit in 2014

Check Point has evidence that (probably government affiliated) Chinese hackers stole and cloned an NSA Windows hacking tool years before (probably government affiliated)...

National Security Risks of Late-Stage Capitalism
From Schneier on Security

National Security Risks of Late-Stage Capitalism

Early in 2020, cyberspace attackers apparently working for the Russian government compromised a piece of widely used network management software made by a company...

Friday Squid Blogging: Vampire Squid Fossil
From Schneier on Security

Friday Squid Blogging: Vampire Squid Fossil

A 30-million-year-old vampire squid fossil was found, lost, and then re-found in Hungary. As usual, you can also use this squid post to talk about the securityhere...

Friday Squid Blogging: On SQUIDS
From Schneier on Security

Friday Squid Blogging: On SQUIDS

A good tutorial: But we can go beyond the polarization of electrons and really leverage the electron waviness. By interleaving thin layers of superconducting and...

Mysterious Macintosh Malware
From Schneier on Security

Mysterious Macintosh Malware

This is weird: Once an hour, infected Macs check a control server to see if there are any new commands the malware should run or binaries to execute. So far, however...

Threat Model Humor
From Schneier on Security

Threat Model Humor

At a hospital.

The Problem with Treating Data as a Commodity
From Schneier on Security

The Problem with Treating Data as a Commodity

Excellent Brookings paper: “Why data ownership is the wrong approach to protecting privacy.” From the introduction: Treating data like it is property fails to recognize...

On Chinese-Owned Technology Platforms
From Schneier on Security

On Chinese-Owned Technology Platforms

I am a co-author on a report published by the Hoover Institution: “Chinese Technology Platforms Operating in the United States.” From a blog post: The report suggests...

Twelve-Year-Old Vulnerability Found in Windows Defender
From Schneier on Security

Twelve-Year-Old Vulnerability Found in Windows Defender

Researchers found, and Microsoft has patched, a vulnerability in Windows Defender that has been around for twelve years. There is no evidence that anyone has used...

Dependency Confusion: Another Supply-Chain Vulnerability
From Schneier on Security

Dependency Confusion: Another Supply-Chain Vulnerability

Alex Birsan writes about being able to install malware into proprietary corporate software by naming the code files to be identical to internal corporate code files...

GPS Vulnerabilities
From Schneier on Security

GPS Vulnerabilities

Really good op-ed in the New York Times about how vulnerable the GPS system is to interference, spoofing, and jamming — and potential alternatives. The 2018 National...

Router Security
From Schneier on Security

Router Security

This report is six months old, and I don’t know anything about the organization that produced it, but it has some alarming data about router security. Conclusion...

US Cyber Command Valentine’s Day Cryptography Puzzles
From Schneier on Security

US Cyber Command Valentine’s Day Cryptography Puzzles

The US Cyber Command has released a series of ten Valentine’s Day “Cryptography Challenge Puzzles.” Slashdot thread. Reddit thread. (And here’s the archived link...

Chinese Supply-Chain Attack on Computer Systems
From Schneier on Security

Chinese Supply-Chain Attack on Computer Systems

Bloomberg News has a major story about the Chinese hacking computer motherboards made by Supermicro, Levono, and others. It’s been going on since at least 2008....

Browser Tracking Using Favicons
From Schneier on Security

Browser Tracking Using Favicons

Interesting research on persistent web tracking using favicons. (For those who don’t know, favicons are those tiny icons that appear in browser tabs next to the...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account