acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Password Changing After a Breach
From Schneier on Security

Password Changing After a Breach

This study shows that most people don't change their passwords after a breach, and if they do they change it to a weaker password. Abstract: To protect against...

Friday Squid Blogging: Humboldt Squid Communication
From Schneier on Security

Friday Squid Blogging: Humboldt Squid Communication

Humboldt Squid communicate by changing their skin patterns and glowing. As usual, you can also use this squid post to talk about the security stories in the news...

Bogus Security Technology: An Anti-5G USB Stick
From Schneier on Security

Bogus Security Technology: An Anti-5G USB Stick

The 5GBioShield sells for £339.60, and the description sounds like snake oil: ...its website, which describes it as a USB key that "provides protection for your...

Facebook Announces Messenger Security Features that Don't Compromise Privacy
From Schneier on Security

Facebook Announces Messenger Security Features that Don't Compromise Privacy

Note that this is "announced," so we don't know when it's actually going to be implemented. Facebook today announced new features for Messenger that will alert...

Thermal Imaging as Security Theater
From Schneier on Security

Thermal Imaging as Security Theater

Seems like thermal imaging is the security theater technology of today. These features are so tempting that thermal cameras are being installed at an increasing...

Websites Conducting Port Scans
From Schneier on Security

Websites Conducting Port Scans

Security researcher Charlie Belmer is reporting that commercial websites such as eBay are conducting port scans of their visitors. Looking at the list of ports...

Bluetooth Vulnerability: BIAS
From Schneier on Security

Bluetooth Vulnerability: BIAS

This is new research on a Bluetooth vulnerability (called BIAS) that allows someone to impersonate a trusted device: Abstract: Bluetooth (BR/EDR) is a pervasive...

Friday Squid Blogging: Squid Can Edit Their Own Genomes
From Schneier on Security

Friday Squid Blogging: Squid Can Edit Their Own Genomes

This is new news: Revealing yet another super-power in the skillful squid, scientists have discovered that squid massively edit their own genetic instructions not...

Ann Mitchell, Bletchley Park Cryptanalyst, Dies
From Schneier on Security

Ann Mitchell, Bletchley Park Cryptanalyst, Dies

Obituary....

Bart Gellman on Snowden
From Schneier on Security

Bart Gellman on Snowden

Bart Gellman's long-awaited (at least by me) book on Edward Snowden, Dark Mirror: Edward Snowden and the American Surveillance State, will finally be published...

Criminals and the Normalization of Masks
From Schneier on Security

Criminals and the Normalization of Masks

I was wondering about this: Masks that have made criminals stand apart long before bandanna-wearing robbers knocked over stagecoaches in the Old West and ski-masked...

AI and Cybersecurity
From Schneier on Security

AI and Cybersecurity

Ben Buchanan has written "A National Security Research Agenda for Cybersecurity and Artificial Intelligence." It's really good -- well worth reading....

Ramsey Malware
From Schneier on Security

Ramsey Malware

A new malware, called Ramsey, can jump air gaps: ESET said they've been able to track down three different versions of the Ramsay malware, one compiled in September...

Friday Squid Blogging: Vegan "Squid" Made from Chickpeas
From Schneier on Security

Friday Squid Blogging: Vegan "Squid" Made from Chickpeas

It's beyond Beyond Meat. A Singapore company wants to make vegan "squid" -- and shrimp and crab -- from chickpeas. As usual, you can also use this squid post to...

On Marcus Hutchins
From Schneier on Security

On Marcus Hutchins

Long and nuanced story about Marcus Hutchins, the British hacker who wrote most of the Kronos malware and also stopped WannaCry in real time. Well worth reading...

US Government Exposes North Korean Malware
From Schneier on Security

US Government Exposes North Korean Malware

US Cyber Command has uploaded North Korean malware samples to the VirusTotal aggregation repository, adding to the malware samples it uploaded in February. The...

New U.S. Electronic Warfare Platform
From Schneier on Security

New U.S. Electronic Warfare Platform

The Army is developing a new electronic warfare pod capable of being put on drones and on trucks. ...the Silent Crow pod is now the leading contender for the flying...

Attack Against PC Thunderbolt Port
From Schneier on Security

Attack Against PC Thunderbolt Port

The attack requires physical access to the computer, but it's pretty devastating: On Thunderbolt-enabled Windows or Linux PCs manufactured before 2019, his technique...

Another California Data Privacy Law
From Schneier on Security

Another California Data Privacy Law

The California Consumer Privacy Act is a lesson in missed opportunities. It was passed in haste, to stop a ballot initiative that would have been even more restrictive...

Friday Squid Blogging: Jurassic Squid Attack
From Schneier on Security

Friday Squid Blogging: Jurassic Squid Attack

It's the oldest squid attack on record: An ancient squid-like creature with 10 arms covered in hooks had just crushed the skull of its prey in a vicious attack...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account