acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Long-Range Familial Searching Forensics
From Schneier on Security

Long-Range Familial Searching Forensics

Good article on using long-range familial searching -- basically, DNA matching of distant relatives -- as a police forensics tool....

China's APT10
From Schneier on Security

China's APT10

Wired has an excellent article on China's APT10 hacking group. Specifically, on how they hacked managed service providers in order to get to their customers' networks...

Friday Squid Blogging: Squid-Focused Menus in Croatia
From Schneier on Security

Friday Squid Blogging: Squid-Focused Menus in Croatia

This is almost over: From 1 December 2018 -- 6 January 2019, Days of Adriatic squid will take place at restaurants all over north-west Istria. Restaurants will...

Click Here to Kill Everybody Available as an Audiobook
From Schneier on Security

Click Here to Kill Everybody Available as an Audiobook

Click Here to Kill Everybody is finally available on Audible.com. I have ten download codes. Not having anything better to do with them, here they are: HADQSSFC98WCQ...

Massive Ad Fraud Scheme Relied on BGP Hijacking
From Schneier on Security

Massive Ad Fraud Scheme Relied on BGP Hijacking

This is a really interesting story of an ad fraud scheme that relied on hijacking the Border Gateway Protocol: Members of 3ve (pronounced "eve") used their large...

Stealing Nativity Displays
From Schneier on Security

Stealing Nativity Displays

The New York Times is reporting on the security measures people are using to protect nativity displays....

Human Rights by Design
From Schneier on Security

Human Rights by Design

Good essay: "Advancing Human-Rights-By-Design In The Dual-Use Technology Industry," by Jonathon Penney, Sarah McKune, Lex Gill, and Ronald J. Deibert: But businesses...

Glitter Bomb against Package Thieves
From Schneier on Security

Glitter Bomb against Package Thieves

Stealing packages from unattended porches is a rapidly rising crime, as more of us order more things by mail. One person hid a glitter bomb and a video recorder...

MD5 and SHA-1 Still Used in 2018
From Schneier on Security

MD5 and SHA-1 Still Used in 2018

Last week, the Scientific Working Group on Digital Evidence published a draft document -- "SWGDE Position on the Use of MD5 and SHA1 Hash Algorithms in Digital...

Friday Squid Blogging: Illegal North Korean Squid Fishing
From Schneier on Security

Friday Squid Blogging: Illegal North Korean Squid Fishing

North Korea is engaged in even more illegal squid fishing than previously. As usual, you can also use this squid post to talk about the security stories in the...

Drone Denial-of-Service Attack against Gatwick Airport
From Schneier on Security

Drone Denial-of-Service Attack against Gatwick Airport

Someone is flying a drone over Gatwick Airport in order to disrupt service: Chris Woodroofe, Gatwick's chief operating officer, said on Thursday afternoon there...

Fraudulent Tactics on Amazon Marketplace
From Schneier on Security

Fraudulent Tactics on Amazon Marketplace

Fascinating article about the many ways Amazon Marketplace sellers sabotage each other and defraud customers. The opening example: framing a seller for false advertising...

Congressional Report on the 2017 Equifax Data Breach
From Schneier on Security

Congressional Report on the 2017 Equifax Data Breach

The US House of Representatives Committee on Oversight and Government Reform has just released a comprehensive report on the 2017 Equifax hack. It's a great piece...

Teaching Cybersecurity Policy
From Schneier on Security

Teaching Cybersecurity Policy

Peter Swire proposes a a pedagogic framework for teaching cybersecurity policy. Specifically, he makes real the old joke about adding levels to the OSI networking...

New Shamoon Variant
From Schneier on Security

New Shamoon Variant

A new variant of the Shamoon malware has destroyed signifigant amounts of data at a UAE "heavy engineering company" and the Italian oil and gas contractor Saipem...

Real-Time Attacks Against Two-Factor Authentication
From Schneier on Security

Real-Time Attacks Against Two-Factor Authentication

Attackers are targeting two-factor authentication systems: Attackers working on behalf of the Iranian government collected detailed information on targets and used...

Friday Squid Blogging: More Problems with the Squid Emoji
From Schneier on Security

Friday Squid Blogging: More Problems with the Squid Emoji

Piling on from last week's post, the squid emoji's siphon is in the wrong place. As usual, you can also use this squid post to talk about the security stories in...

Marriott Hack Reported as Chinese State-Sponsored
From Schneier on Security

Marriott Hack Reported as Chinese State-Sponsored

The New York Times and Reuters are reporting that China was behind the recent hack of Mariott Hotels. Note that this is still uncomfirmed, but interesting if it...

New Australian Backdoor Law
From Schneier on Security

New Australian Backdoor Law

Last week, Australia passed a law https://www.bbc.com/news/world-australia-46463029">giving the government the ability to demand backdoors in computers and communications...

2018 Annual Report from AI Now
From Schneier on Security

2018 Annual Report from AI Now

The research group AI Now just published its annual report. It's an excellent summary of today's AI security challenges, as well as a policy agenda to address them...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account