acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Can Consumers' Online Data Be Protected?
From Schneier on Security

Can Consumers' Online Data Be Protected?

Everything online is hackable. This is true for Equifax's data and the federal Office of Personal Management's data, which was hacked in 2015. If information is...

Jumping Air Gaps
From Schneier on Security

Jumping Air Gaps

Nice profile of Mordechai Guri, who researches a variety of clever ways to steal data over air-gapped computers. Guri and his fellow Ben-Gurion researchers have...

Internet Security Threats at the Olympics
From Schneier on Security

Internet Security Threats at the Olympics

There are a lot: The cybersecurity company McAfee recently uncovered a cyber operation, dubbed Operation GoldDragon, attacking South Korean organizations related...

Calling Squid "Calamari" Makes It More Appetizing
From Schneier on Security

Calling Squid "Calamari" Makes It More Appetizing

Research shows that what a food is called affects how we think about it. Research paper. As usual, you can also use this squid post to talk about the security stories...

Living in a Smart Home
From Schneier on Security

Living in a Smart Home

In "The House that spied on Me," Kashmir Hill outfits her home to be as "smart" as possible and writes about the results....

Water Utility Infected By Cryptocurrency Mining Software
From Schneier on Security

Water Utility Infected By Cryptocurrency Mining Software

A water utility in Europe has been infected by cryptocurrency mining software. This is a relatively new attack: hackers compromise computers and force them to mine...

Cabinet of Secret Documents from Australia
From Schneier on Security

Cabinet of Secret Documents from Australia

This story of leaked Australian government secrets is unlike any other I've heard: It begins at a second-hand shop in Canberra, where ex-government furniture is...

Poor Security at the Uk National Health Service
From Schneier on Security

Poor Security at the Uk National Health Service

The Guardian is reporting that "every NHS trust assessed for cyber security vulnerabilities has failed to meet the standard required." This is the same NHS that...

Sensitive Super-Bowl Security Documents Left on an Airplane
From Schneier on Security

Sensitive Super-Bowl Security Documents Left on an Airplane

A CNN reporter found...

Friday Squid Blogging: Kraken Pie
From Schneier on Security

Friday Squid Blogging: Kraken Pie

Pretty, but contains no actual squid ingredients. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered...

Signed Malware
From Schneier on Security

Signed Malware

Stuxnet famously used legitimate digital certificates to sign its malware. A research paper from last year found that the practice is much more common than previously...

Jackpotting Attacks Against US ATMs
From Schneier on Security

Jackpotting Attacks Against US ATMs

Brian Krebs is reporting sophisticated jackpotting attacks against US ATMs. The attacker gains physical access to the ATM, plants malware using specialized electronics...

Israeli Scientists Accidentally Reveal Classified Information
From Schneier on Security

Israeli Scientists Accidentally Reveal Classified Information

According to this story (non-paywall English version here), Israeli scientists released some information to the public they shouldn't have. Defense establishment...

After Section 702 Reauthorization
From Schneier on Security

After Section 702 Reauthorization

For over a decade, civil libertarians have been fighting government mass surveillance of innocent Americans over the Internet. We've just lost an important battle...

Subway Elevators and Movie-Plot Threats
From Schneier on Security

Subway Elevators and Movie-Plot Threats

Local residents are opposing adding an elevator to a subway station because terrorists might use it to detonate a bomb. No, really. There's no actual threat analysis...

Locating Secret Military Bases via Fitness Data
From Schneier on Security

Locating Secret Military Bases via Fitness Data

In November, the company Strava released an anonymous data-visualization map showing all the fitness activity by everyone using the app. Over this weekend, someone...

Estimating the Cost of Internet Insecurity
From Schneier on Security

Estimating the Cost of Internet Insecurity

It's really hard to estimate the cost of an insecure Internet. Studies are all over the map. A methodical study by RAND is the best work I've seen at trying to...

Friday Squid Blogging: Squid that Mate, Die, and Then Sink
From Schneier on Security

Friday Squid Blogging: Squid that Mate, Die, and Then Sink

The mating and death characteristics of some squid are fascinating. Research paper. As usual, you can also use this squid post to talk about the security stories...

The Effects of the Spectre and Meltdown Vulnerabilities
From Schneier on Security

The Effects of the Spectre and Meltdown Vulnerabilities

On January 3, the world learned about a series of major security vulnerabilities in modern microprocessors. Called Spectre and Meltdown, these vulnerabilities were...

WhatsApp Vulnerability
From Schneier on Security

WhatsApp Vulnerability

A new vulnerability in WhatsApp has been discovered: ...the researchers unearthed far more significant gaps in WhatsApp's security: They say that anyone who controls...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account