acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

The NSA on the Risks of Exposing Location Data
From Schneier on Security

The NSA on the Risks of Exposing Location Data

The NSA has issued an advisory on the risks of location data. Mitigations reduce, but do not eliminate, location tracking risks in mobile devices. Most users rely...

Cybercrime in the Age of COVID-19
From Schneier on Security

Cybercrime in the Age of COVID-19

The Cambridge Cybercrime Centre has a series of papers on cybercrime during the coronavirus pandemic....

BlackBerry Phone Cracked
From Schneier on Security

BlackBerry Phone Cracked

Australia is reporting that a BlackBerry device has been cracked after five years: An encrypted BlackBerry device that was cracked five years after it was first...

Twitter Hacker Arrested
From Schneier on Security

Twitter Hacker Arrested

A 17-year-old Florida boy was arrested and charged with last week's Twitter hack. News articles. Boing Boing post. Florida state attorney press release. This is...

Friday Squid Blogging: Squid Proteins for a Better Face Mask
From Schneier on Security

Friday Squid Blogging: Squid Proteins for a Better Face Mask

Researchers are synthesizing squid proteins to create a face mask that better survives cleaning. (And you thought there was no connection between squid and COVID...

Data and Goliath Book Placement
From Schneier on Security

Data and Goliath Book Placement

Notice the copy of Data and Goliath just behind the head of Maine Senator Angus King. This demonstrates the importance of a vibrant color and a large font....

Fake Stories in Real News Sites
From Schneier on Security

Fake Stories in Real News Sites

Fireeye is reporting that a hacking group called Ghostwriter broke into the content management systems of Eastern European news sites to plant fake stories. From...

Survey of Supply Chain Attacks
From Schneier on Security

Survey of Supply Chain Attacks

The Atlantic Council has a released a report that looks at the history of computer supply chain attacks. Key trends from their summary: Deep Impact from State Actors...

Images in Eye Reflections
From Schneier on Security

Images in Eye Reflections

In Japan, a cyberstalker located his victim by enhancing the reflections in her eye, and using that information to establish a location. Reminds me of the image...

Friday Squid Blogging: Introducing the Seattle Kraken
From Schneier on Security

Friday Squid Blogging: Introducing the Seattle Kraken

The Kraken is the name of Seattle's new NFL franchise. I have always really liked collective nouns as sports team names (like the Utah Jazz or the Minnesota Wild)...

Update on NIST's Post-Quantum Cryptography Program
From Schneier on Security

Update on NIST's Post-Quantum Cryptography Program

NIST has posted an update on their post-quantum cryptography program: After spending more than three years examining new approaches to encryption and data protection...

Adversarial Machine Learning and the CFAA
From Schneier on Security

Adversarial Machine Learning and the CFAA

I just co-authored a paper on the legal risks of doing machine learning research, given the current state of the Computer Fraud and Abuse Act: Abstract: Adversarial...

Fawkes: Digital Image Cloaking
From Schneier on Security

Fawkes: Digital Image Cloaking

Fawkes is a system for manipulating digital images so that they aren't recognized by facial recognition systems. At a high level, Fawkes takes your personal images...

Hacking a Power Supply
From Schneier on Security

Hacking a Power Supply

This hack targets the firmware on modern power supplies. (Yes, power supplies are also computers.) Normally, when a phone is connected to a power brick with support...

On the Twitter Hack
From Schneier on Security

On the Twitter Hack

Twitter was hacked this week. Not a few people's Twitter accounts, but all of Twitter. Someone compromised the entire Twitter network, probably by stealing the...

Friday Squid Blogging: Squid Found on Provincetown Sandbar
From Schneier on Security

Friday Squid Blogging: Squid Found on Provincetown Sandbar

Headline: "Dozens of squid found on Provincetown sandbar." Slow news day. As usual, you can also use this squid post to talk about the security stories in the news...

Twitter Hackers May Have Bribed an Insider
From Schneier on Security

Twitter Hackers May Have Bribed an Insider

Motherboard is reporting that this week's Twitter hack involved a bribed insider. Twitter has denied it. I have been taking press calls all day about this. And...

NSA on Securing VPNs
From Schneier on Security

NSA on Securing VPNs

The NSA's Central Security Service -- that's the part that's supposed to work on defense -- has released two documents (a full and an abridged version) on securing...

Enigma Machine for Sale
From Schneier on Security

Enigma Machine for Sale

A four-rotor Enigma machine -- with rotors -- is up for auction....

A Peek into the Fake Review Marketplace
From Schneier on Security

A Peek into the Fake Review Marketplace

A personal account of someone who was paid to buy products on Amazon and leave fake reviews. Fake reviews are one of the problems that everyone knows about, and...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account