acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Breaking the Anonymity in the Cryptocurrency Monero
From Schneier on Security

Breaking the Anonymity in the Cryptocurrency Monero

Researchers have exploited a flaw in the cryptocurrency Monero to break the anonymity of transactions. Research paper. BoingBoing post....

Tracing Stolen Bitcoin
From Schneier on Security

Tracing Stolen Bitcoin

Ross Anderson has a really interesting paper on tracing stolen bitcoin. From a blog post: Previous attempts to track tainted coins had used either the "poison"...

Fooling Face Recognition with Infrared Light
From Schneier on Security

Fooling Face Recognition with Infrared Light

Yet another development in the arms race between facial recognition systems and facial-recognition-system foolers. BoingBoing post....

Adding Backdoors at the Chip Level
From Schneier on Security

Adding Backdoors at the Chip Level

Interesting research into undetectably adding backdoors into computer chips during manufacture: "Stealthy dopant-level hardware Trojans: extended version," also...

Friday Squid Blogging: Giant Squid Stealing Food from Each Other
From Schneier on Security

Friday Squid Blogging: Giant Squid Stealing Food from Each Other

An interesting hunting strategy: Off of northern Spain, giant squid often feed on schools of fish called blue whiting. The schools swim 400 meters or less below...

Zeynep Tufekci on Facebook and Cambridge Analytica
From Schneier on Security

Zeynep Tufekci on Facebook and Cambridge Analytica

Zeynep Tufekci is particularly cogent about Facebook and Cambridge Analytica. Several news outlets asked me to write about this issue. I didn't, because 1) my book...

GreyKey iPhone Unlocker
From Schneier on Security

GreyKey iPhone Unlocker

Some details about the iPhone unlocker from the US company Greyshift, with photos. Little is known about Grayshift or its sales model at this point. We don't know...

Reverse Engineering the Cuban Sonic Weapon
From Schneier on Security

Reverse Engineering the Cuban Sonic Weapon

Interesting analysis and speculation....

Hijacking Computers for Cryptocurrency Mining
From Schneier on Security

Hijacking Computers for Cryptocurrency Mining

Interesting paper "A first look at browser-based cryptojacking": Abstract: In this paper, we examine the recent trend towards in-browser mining of cryptocurrencies...

Dan Geer on the Dangers of Computer-Only Systems
From Schneier on Security

Dan Geer on the Dangers of Computer-Only Systems

A good warning, delivered in classic Dan Geer style....

Israeli Security Attacks AMD by Publishing Zero-Day Exploits
From Schneier on Security

Israeli Security Attacks AMD by Publishing Zero-Day Exploits

Last week, the Israeli security company CTS Labs published a series of exploits against AMD chips. The publication came with the flashy website, detailed whitepaper...

Friday Squid Blogging: New Squid Species Discovered in Australia
From Schneier on Security

Friday Squid Blogging: New Squid Species Discovered in Australia

A new species of pygmy squid was discovered in Western Australia. It's pretty cute. As usual, you can also use this squid post to talk about the security stories...

Interesting Article on Marcus Hutchins
From Schneier on Security

Interesting Article on Marcus Hutchins

This is a good article on the complicated story of hacker Marcus Hutchins....

Artificial Intelligence and the Attack/Defense Balance
From Schneier on Security

Artificial Intelligence and the Attack/Defense Balance

Artificial intelligence technologies have the potential to upend the longstanding advantage that attack has over defense on the Internet. This has to do with the...

The 600+ Companies PayPal Shares Your Data With
From Schneier on Security

The 600+ Companies PayPal Shares Your Data With

One of the effects of GDPR -- the new EU General Data Protection Regulation -- is that we're all going to be learning a lot more about who collects our data and...

E-Mailing Private HTTPS Keys
From Schneier on Security

E-Mailing Private HTTPS Keys

I don't know what to make of this story: The email was sent on Tuesday by the CEO of Trustico, a UK-based reseller of TLS certificates issued by the browser-trusted...

Greyshift Sells Phone Unlocking Services
From Schneier on Security

Greyshift Sells Phone Unlocking Services

Here's another company that claims to unlock phones for a price....

Two New Papers on the Encryption Debate
From Schneier on Security

Two New Papers on the Encryption Debate

Seems like everyone is writing about encryption and backdoors this season. "Policy Approaches to the Encryption Debate," R Street Policy Study #133, by Charles...

Friday Squid Blogging: Interesting Interview
From Schneier on Security

Friday Squid Blogging: Interesting Interview

Here's an hour-long audio interview with squid scientist Sarah McAnulty. As usual, you can also use this squid post to talk about the security stories in the news...

OURSA Conference
From Schneier on Security

OURSA Conference

Responding to the lack of diversity at the RSA Conference, a group of security experts have announced a competing one-day conference: OUR Security Advocates, or...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account