acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Another NSA Leaker Identified and Charged
From Schneier on Security

Another NSA Leaker Identified and Charged

In 2015, the Intercept started publishing "The Drone Papers," based on classified documents leaked by an unknown whistleblower. Today, someone who worked at the...

Amazon Is Losing the War on Fraudulent Sellers
From Schneier on Security

Amazon Is Losing the War on Fraudulent Sellers

Excellent article on fraudulent seller tactics on Amazon. The most prominent black hat companies for US Amazon sellers offer ways to manipulate Amazon's ranking...

Leaked NSA Hacking Tools
From Schneier on Security

Leaked NSA Hacking Tools

In 2016, a hacker group calling itself the Shadow Brokers released a trove of 2013 NSA hacking tools and related documents. Most people believe it is a front for...

Malicious MS Office Macro Creator
From Schneier on Security

Malicious MS Office Macro Creator

Evil Clippy is a tool for creating malicious Microsoft Office macros: At BlackHat Asia we released Evil Clippy, a tool which assists red teamers and security testers...

Locked Computers
From Schneier on Security

Locked Computers

This short video explains why computers regularly came with physical locks in the late 1980s and early 1990s. The one thing the video doesn't talk about is RAM...

First Physical Retaliation for a Cyberattack
From Schneier on Security

First Physical Retaliation for a Cyberattack

Israel has acknowledged that its recent airstrikes against Hamas were a real-time response to an ongoing cyberattack. From Twitter: CLEARED FOR RELEASE: We thwarted...

Protecting Yourself from Identity Theft
From Schneier on Security

Protecting Yourself from Identity Theft

I don't have a lot of good news for you. The truth is there's nothing we can do to protect our data from being stolen by cybercriminals and others. Ten years ago...

Friday Squid Blogging: Squid Skin "Inspires" New Thermal Sheeting
From Schneier on Security

Friday Squid Blogging: Squid Skin "Inspires" New Thermal Sheeting

Researchers are making space blankets using technology based on squid skin. Honestly, it's hard to tell how much squid is actually involved in this invention. As...

Cybersecurity for the Public Interest
From Schneier on Security

Cybersecurity for the Public Interest

The Crypto Wars have been waging off-and-on for a quarter-century. On one side is law enforcement, which wants to be able to break encryption, to access devices...

Why Isn't GDPR Being Enforced?
From Schneier on Security

Why Isn't GDPR Being Enforced?

Politico has a long article making the case that the lead GDPR regulator, Ireland, has too cozy a relationship with Silicon Valley tech companies to effectively...

On Security Tokens
From Schneier on Security

On Security Tokens

Mark Risher of Google extols the virtues of security keys: I'll say it again for the people in the back: with Security Keys, instead of the *user* needing to verify...

Defending Democracies Against Information Attacks
From Schneier on Security

Defending Democracies Against Information Attacks

To better understand influence attacks, we proposed an approach that models democracy itself as an information system and explains how democracies are vulnerable...

Stealing Ethereum by Guessing Weak Private Keys
From Schneier on Security

Stealing Ethereum by Guessing Weak Private Keys

Someone is stealing millions of dollars worth of Ethereum by guessing users' private keys. Normally this should be impossible, but lots of keys seem to be very...

Friday Squid Blogging: Toraiz SQUID Digital Sequencer
From Schneier on Security

Friday Squid Blogging: Toraiz SQUID Digital Sequencer

Pioneer DJ has a new sequencer: the Toraiz SQUID: Sequencer Inspirational Device. The 16-track sequencer is designed around jamming and performance with a host...

Interview of Me in Taiwan
From Schneier on Security

Interview of Me in Taiwan

Business Weekly in Taiwan interviewed me. (Here's a translation courtesy of Google.) It was a surprisingly intimate interview. I hope the Chinese reads better than...

Towards an Information Operations Kill Chain
From Schneier on Security

Towards an Information Operations Kill Chain

Cyberattacks don't magically happen; they involve a series of steps. And far from being helpless, defenders can disrupt the attack at any of those steps. This framing...

Fooling Automated Surveillance Cameras with Patchwork Color Printout
From Schneier on Security

Fooling Automated Surveillance Cameras with Patchwork Color Printout

Nice bit of adversarial machine learning. The image from this news article is most of what you need to know, but here's the research paper....

Vulnerability in French Government Tchap Chat App
From Schneier on Security

Vulnerability in French Government Tchap Chat App

A researcher found a vulnerability in the French government WhatsApp replacement app: Tchap. The vulnerability allows anyone to surreptitiously join any conversation...

G7 Comes Out in Favor of Encryption Backdoors
From Schneier on Security

G7 Comes Out in Favor of Encryption Backdoors

From a G7 meeting of interior ministers in Paris this month, an "outcome document": Encourage Internet companies to establish lawful access solutions for their...

Excellent Analysis of the Boeing 737 MAX Software Problems
From Schneier on Security

Excellent Analysis of the Boeing 737 MAX Software Problems

This is the best analysis of the software causes of the Boeing 737 MAX disasters that I have read. Technically this is safety and not security; there was no attacker...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account