acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

More on the Triton Malware
From Schneier on Security

More on the Triton Malware

FireEye is releasing much more information about the Triton malware that attacks critical infrastructure. It has been discovered in more places. This is also a...

Vulnerabilities in the WPA3 Wi-Fi Security Protocol
From Schneier on Security

Vulnerabilities in the WPA3 Wi-Fi Security Protocol

Researchers have found several vulnerabilities in the WPA3 Wi-Fi security protocol: The design flaws we discovered can be divided in two categories. The first category...

China Spying on Undersea Internet Cables
From Schneier on Security

China Spying on Undersea Internet Cables

Supply chain security is an insurmountably hard problem. The recent focus is on Chinese 5G equipment, but the problem is much broader. This opinion piece looks...

Friday Squid Blogging: Detecting Illegal Squid Fishing with Satellite Imagery
From Schneier on Security

Friday Squid Blogging: Detecting Illegal Squid Fishing with Satellite Imagery

Interesting. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here...

Maliciously Tampering with Medical Imagery
From Schneier on Security

Maliciously Tampering with Medical Imagery

In what I am sure is only a first in many similar demonstrations, researchers are able to add or remove cancer signs from CT scans. The results easily fool radiologists...

New Version of Flame Malware Discovered
From Schneier on Security

New Version of Flame Malware Discovered

Flame was discovered in 2012, linked to Stuxnet, and believed to be American in origin. It has recently been linked to more modern malware through new analysis...

TajMahal Spyware
From Schneier on Security

TajMahal Spyware

Kaspersky has released details about a sophisticated nation-state spyware it calls TajMahal: The TajMahal framework's 80 modules, Shulmin says, comprise not only...

How the Anonymous Artist Bansky Authenticates His or Her Work
From Schneier on Security

How the Anonymous Artist Bansky Authenticates His or Her Work

Interesting scheme: It all starts off with a fairly bog standard gallery style certificate. Details of the work, the authenticating agency, a bit of embossing and...

Hey Secret Service: Don't Plug Suspect USB Sticks into Random Computers
From Schneier on Security

Hey Secret Service: Don't Plug Suspect USB Sticks into Random Computers

I just noticed this bit from the incredibly weird story of the Chinese woman arrested at Mar-a-Lago: Secret Service agent Samuel Ivanovich, who interviewed Zhang...

Ghidra: NSA's Reverse-Engineering Tool
From Schneier on Security

Ghidra: NSA's Reverse-Engineering Tool

Last month, the NSA released Ghidra, a software reverse-engineering tool. Early reactions are uniformly positive. Three news articles....

Friday Squid Blogging: Fried Squid Recipe
From Schneier on Security

Friday Squid Blogging: Fried Squid Recipe

This is an easy fried squid recipe with saffron and agrodolce. As usual, you can also use this squid post to talk about the security stories in the news that I...

Unhackable Cryptography?
From Schneier on Security

Unhackable Cryptography?

A recent article overhyped the release of EverCrypt, a cryptography library created using formal methods to prove security against specific attacks. The Quantum...

Former Mozilla CTO Harassed at the US Border
From Schneier on Security

Former Mozilla CTO Harassed at the US Border

This is a pretty awful story of how Andreas Gal, former Mozilla CTO and US citizen, was detained and threatened at the US border. CBP agents demanded that he unlock...

Adversarial Machine Learning against Tesla's Autopilot
From Schneier on Security

Adversarial Machine Learning against Tesla's Autopilot

Researchers have been able to fool Tesla's autopilot in a variety of ways, including convincing it to drive into oncoming traffic. It requires the placement of...

How Political Campaigns Use Personal Data
From Schneier on Security

How Political Campaigns Use Personal Data

Really interesting report from Tactical Tech. Data-driven technologies are an inevitable feature of modern political campaigning. Some argue that they are a welcome...

Hacking Instagram to Get Free Meals in Exchange for Positive Reviews
From Schneier on Security

Hacking Instagram to Get Free Meals in Exchange for Positive Reviews

This is a fascinating hack: In today's digital age, a large Instagram audience is considered a valuable currency. I had also heard through the grapevine that I...

Recovering Smartphone Typing from Microphone Sounds
From Schneier on Security

Recovering Smartphone Typing from Microphone Sounds

Yet another side-channel attack on smartphones: "Hearing your touch: A new acoustic side channel on smartphones," by Ilia Shumailov, Laurent Simon, Jeff Yan, and...

Friday Squid Blogging: Restoring the Giant Squid at the Museum of Natural History
From Schneier on Security

Friday Squid Blogging: Restoring the Giant Squid at the Museum of Natural History

It is traveling to Paris. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting...

NSA-Inspired Vulnerability Found in Huawei Laptops
From Schneier on Security

NSA-Inspired Vulnerability Found in Huawei Laptops

This is an interesting story of a serious vulnerability in a Huawei driver that Microsoft found. The vulnerability is similar in style to the NSA's DOUBLEPULSAR...

Malware Installed in Asus Computers Through Hacked Update Process
From Schneier on Security

Malware Installed in Asus Computers Through Hacked Update Process

Kaspersky Labs is reporting on a new supply chain attack they call "Shadowhammer." In January 2019, we discovered a sophisticated supply chain attack involving...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account