acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Massive Ad Fraud Scheme Relied on BGP Hijacking
From Schneier on Security

Massive Ad Fraud Scheme Relied on BGP Hijacking

This is a really interesting story of an ad fraud scheme that relied on hijacking the Border Gateway Protocol: Members of 3ve (pronounced "eve") used their large...

Stealing Nativity Displays
From Schneier on Security

Stealing Nativity Displays

The New York Times is reporting on the security measures people are using to protect nativity displays....

Human Rights by Design
From Schneier on Security

Human Rights by Design

Good essay: "Advancing Human-Rights-By-Design In The Dual-Use Technology Industry," by Jonathon Penney, Sarah McKune, Lex Gill, and Ronald J. Deibert: But businesses...

Glitter Bomb against Package Thieves
From Schneier on Security

Glitter Bomb against Package Thieves

Stealing packages from unattended porches is a rapidly rising crime, as more of us order more things by mail. One person hid a glitter bomb and a video recorder...

MD5 and SHA-1 Still Used in 2018
From Schneier on Security

MD5 and SHA-1 Still Used in 2018

Last week, the Scientific Working Group on Digital Evidence published a draft document -- "SWGDE Position on the Use of MD5 and SHA1 Hash Algorithms in Digital...

Friday Squid Blogging: Illegal North Korean Squid Fishing
From Schneier on Security

Friday Squid Blogging: Illegal North Korean Squid Fishing

North Korea is engaged in even more illegal squid fishing than previously. As usual, you can also use this squid post to talk about the security stories in the...

Drone Denial-of-Service Attack against Gatwick Airport
From Schneier on Security

Drone Denial-of-Service Attack against Gatwick Airport

Someone is flying a drone over Gatwick Airport in order to disrupt service: Chris Woodroofe, Gatwick's chief operating officer, said on Thursday afternoon there...

Fraudulent Tactics on Amazon Marketplace
From Schneier on Security

Fraudulent Tactics on Amazon Marketplace

Fascinating article about the many ways Amazon Marketplace sellers sabotage each other and defraud customers. The opening example: framing a seller for false advertising...

Congressional Report on the 2017 Equifax Data Breach
From Schneier on Security

Congressional Report on the 2017 Equifax Data Breach

The US House of Representatives Committee on Oversight and Government Reform has just released a comprehensive report on the 2017 Equifax hack. It's a great piece...

Teaching Cybersecurity Policy
From Schneier on Security

Teaching Cybersecurity Policy

Peter Swire proposes a a pedagogic framework for teaching cybersecurity policy. Specifically, he makes real the old joke about adding levels to the OSI networking...

New Shamoon Variant
From Schneier on Security

New Shamoon Variant

A new variant of the Shamoon malware has destroyed signifigant amounts of data at a UAE "heavy engineering company" and the Italian oil and gas contractor Saipem...

Real-Time Attacks Against Two-Factor Authentication
From Schneier on Security

Real-Time Attacks Against Two-Factor Authentication

Attackers are targeting two-factor authentication systems: Attackers working on behalf of the Iranian government collected detailed information on targets and used...

Friday Squid Blogging: More Problems with the Squid Emoji
From Schneier on Security

Friday Squid Blogging: More Problems with the Squid Emoji

Piling on from last week's post, the squid emoji's siphon is in the wrong place. As usual, you can also use this squid post to talk about the security stories in...

Marriott Hack Reported as Chinese State-Sponsored
From Schneier on Security

Marriott Hack Reported as Chinese State-Sponsored

The New York Times and Reuters are reporting that China was behind the recent hack of Mariott Hotels. Note that this is still uncomfirmed, but interesting if it...

New Australian Backdoor Law
From Schneier on Security

New Australian Backdoor Law

Last week, Australia passed a law https://www.bbc.com/news/world-australia-46463029">giving the government the ability to demand backdoors in computers and communications...

2018 Annual Report from AI Now
From Schneier on Security

2018 Annual Report from AI Now

The research group AI Now just published its annual report. It's an excellent summary of today's AI security challenges, as well as a policy agenda to address them...

Problems with the Squid Emoji
From Schneier on Security

Problems with the Squid Emoji

The Monterey Bay Aquarium has some problems with the squid emoji. As usual, you can also use this squid post to talk about the security stories in the news that...

Back Issues of the NSA's Cryptolog
From Schneier on Security

Back Issues of the NSA's Cryptolog

Five years ago, the NSA published 23 years of its internal magazine, Cryptolog. There were lots of redactions, of course. What's new is a nice user interface for...

Banks Attacked through Malicious Hardware Connected to the Local Network
From Schneier on Security

Banks Attacked through Malicious Hardware Connected to the Local Network

Kaspersky is reporting on a series of bank hacks -- called DarkVishnya -- perpetrated through malicious hardware being surreptitiously installed into the target...

Your Personal Data is Already Stolen
From Schneier on Security

Your Personal Data is Already Stolen

In an excellent blog post, Brian Krebs makes clear something I have been saying for a while: Likewise for individuals, it pays to accept two unfortunate and harsh...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account