acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

E-Mail Vulnerabilities and Disclosure
From Schneier on Security

E-Mail Vulnerabilities and Disclosure

Last week, researchers disclosed vulnerabilities in a large number of encrypted email clients: specifically, those that use OpenPGP and S/MIME, including Thunderbird...

Friday Squid Blogging: Do Cephalopods Contain Alien DNA?
From Schneier on Security

Friday Squid Blogging: Do Cephalopods Contain Alien DNA?

Maybe not DNA, but biological somethings. "Cause of Cambrian explosion -- Terrestrial or Cosmic?": Abstract: We review the salient evidence consistent with or predicted...

Damaging Hard Drives with an Ultrasonic Attack
From Schneier on Security

Damaging Hard Drives with an Ultrasonic Attack

Playing a sound over the speakers can cause computers to crash and possibly even physically damage the hard drive. Academic paper....

1834: The First Cyberattack
From Schneier on Security

1834: The First Cyberattack

Tom Standage has a great story of the first cyberattack against a telegraph network. The Blanc brothers traded government bonds at the exchange in the city of Bordeaux...

Numbers Stations
From Schneier on Security

Numbers Stations

On numbers stations....

Kidnapping Fraud
From Schneier on Security

Kidnapping Fraud

Fake kidnapping fraud: "Most commonly we have unsolicited calls to potential victims in Australia, purporting to represent the people in authority in China and...

Friday Squid Blogging: Squid Comic
From Schneier on Security

Friday Squid Blogging: Squid Comic

It's not very good, but it has a squid in it. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Security and Human Behavior (SHB 2018)
From Schneier on Security

Security and Human Behavior (SHB 2018)

I'm at Carnegie Mellon University, at the eleventh Workshop on Security and Human Behavior. SHB is a small invitational gathering of people studying various aspects...

Detecting Lies through Mouse Movements
From Schneier on Security

Detecting Lies through Mouse Movements

Interesting research: "The detection of faked identity using unexpected questions and mouse dynamics," by Merulin Monaro, Luciano Gamberini, and Guiseppe Sartori...

Font Steganography
From Schneier on Security

Font Steganography

Interesting research in steganography at the font level....

Supermarket Shoplifting
From Schneier on Security

Supermarket Shoplifting

The rise of self-checkout has caused a corresponding rise in shoplifting....

Another Spectre-Like CPU Vulnerability
From Schneier on Security

Another Spectre-Like CPU Vulnerability

Google and Microsoft researchers have disclosed another Spectre-like CPU side-channel vulnerability, called "Speculative Store Bypass." Like the others, the fix...

Japan's Directorate for Signals Intelligence
From Schneier on Security

Japan's Directorate for Signals Intelligence

The Intercept has a long article on Japan's equivalent of the NSA: the Directorate for Signals Intelligence. Interesting, but nothing really surprising. The directorate...

Friday Squid Blogging: Flying Squid
From Schneier on Security

Friday Squid Blogging: Flying Squid

Flying squid are real. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines...

Maliciously Changing Someone's Address
From Schneier on Security

Maliciously Changing Someone's Address

Someone changed the address of UPS corporate headquarters to his own apartment in Chicago. The company discovered it three months later. The problem, of course,...

White House Eliminates Cybersecurity Position
From Schneier on Security

White House Eliminates Cybersecurity Position

The White House has eliminated the cybersecurity coordinator position. This seems like a spectacularly bad idea....

Accessing Cell Phone Location Information
From Schneier on Security

Accessing Cell Phone Location Information

The New York Times is reporting about a company called Securus Technologies that gives police the ability to track cell phone locations without a warrant: The service...

Sending Inaudible Commands to Voice Assistants
From Schneier on Security

Sending Inaudible Commands to Voice Assistants

Researchers have demonstrated the ability to send inaudible commands to voice assistants like Alexa, Siri, and Google Assistant. Over the last two years, researchers...

Details on a New PGP Vulnerability
From Schneier on Security

Details on a New PGP Vulnerability

A new PGP vulnerability was announced today. Basically, the vulnerability makes use of the fact that modern e-mail programs allow for embedded HTML objects. Essentially...

Critical PGP Vulnerability
From Schneier on Security

Critical PGP Vulnerability

EFF is reporting that a critical vulnerability has been discovered in PGP and S/MIME. No details have been published yet, but one of the researchers wrote: We'll...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account