acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Detecting Drone Surveillance with Traffic Analysis
From Schneier on Security

Detecting Drone Surveillance with Traffic Analysis

This is clever: Researchers at Ben Gurion University in Beer Sheva, Israel have built a proof-of-concept system for counter-surveillance against spy drones that...

New Malware Hijacks Cryptocurrency Mining
From Schneier on Security

New Malware Hijacks Cryptocurrency Mining

This is a clever attack. After gaining control of the coin-mining software, the malware replaces the wallet address the computer owner uses to collect newly minted...

Skygofree: New Government Malware for Android
From Schneier on Security

Skygofree: New Government Malware for Android

Kaspersky Labs is reporting on a new piece of sophisticated malware: We observed many web landing pages that mimic the sites of mobile operators and which are used...

Dark Caracal: Global Espionage Malware from Lebanon
From Schneier on Security

Dark Caracal: Global Espionage Malware from Lebanon

The EFF and Lookout are reporting on a new piece of spyware operating out of Lebanon. It primarily targets mobile devices compromised by fake secure messaging clients...

Friday Squid Blogging: Te Papa Colossal Squid Exhibition Is Being Renovated
From Schneier on Security

Friday Squid Blogging: Te Papa Colossal Squid Exhibition Is Being Renovated

The New Zealand home of the colossal squid exhibit is behind renovated. As usual, you can also use this squid post to talk about the security stories in the news...

Security Breaches Don't Affect Stock Price
From Schneier on Security

Security Breaches Don't Affect Stock Price

Interesting research: "Long-term market implications of data breaches, not," by Russell Lange and Eric W. Burger. Abstract: This report assesses the impact disclosure...

Student Cracks Inca Knot Code
From Schneier on Security

Student Cracks Inca Knot Code

Interesting....

Article from a Former Chinese PLA General on Cyber Sovereignty
From Schneier on Security

Article from a Former Chinese PLA General on Cyber Sovereignty

Interesting article by Major General Hao Yeli, Chinese People's Liberation Army (ret.), a senior advisor at the China International Institute for Strategic Society...

Jim Risen Writes about Reporting Government Secrets
From Schneier on Security

Jim Risen Writes about Reporting Government Secrets

Jim Risen writes a long and interesting article about his battles with the US government and the New York Times to report government secrets....

Fighting Ransomware
From Schneier on Security

Fighting Ransomware

No More Ransom is a central repository of keys and applications for ransomware, so people can recover their data without paying. It's not complete, of course, but...

Friday Squid Blogging: Japanese "Dude Food" Includes Squid
From Schneier on Security

Friday Squid Blogging: Japanese "Dude Food" Includes Squid

This seems to be a trend. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting...

XKCD's Smartphone Security System
From Schneier on Security

XKCD's Smartphone Security System

Funny....

Facial Recognition Is Coming to Retail
From Schneier on Security

Facial Recognition Is Coming to Retail

Summary article....

Fingerprinting Digital Documents
From Schneier on Security

Fingerprinting Digital Documents

In this era of electronic leakers, remember that zero-width spaces and homoglyph substitution can fingerprint individual instances of files....

Yet Another FBI Proposal for Insecure Communications
From Schneier on Security

Yet Another FBI Proposal for Insecure Communications

Deputy Attorney General Rosenstein has given talks where he proposes that tech companies decrease their communications and device security for the benefit of the...

Susan Landau's New Book: Listening In
From Schneier on Security

Susan Landau's New Book: Listening In

Susan Landau has written a terrific book on cybersecurity threats and why we need strong crypto. Listening In: Cybersecurity in an Insecure Age. It's based in part...

Cybersecurity and the 2017 US National Security Strategy
From Schneier on Security

Cybersecurity and the 2017 US National Security Strategy

Commentaries on the 2017 US national security strategy by Michael Sulmeyer and Ben Buchanan....

Daniel Miessler on My Writings about IoT Security
From Schneier on Security

Daniel Miessler on My Writings about IoT Security

Daniel Miessler criticizes my writings about IoT security: I know it's super cool to scream about how IoT is insecure, how it's dumb to hook up everyday objects...

NSA Morale
From Schneier on Security

NSA Morale

The Washington Post is reporting that poor morale at the NSA is causing a significant talent shortage. A November New York Times article said much the same thing...

Tourist Scams
From Schneier on Security

Tourist Scams

A comprehensive list. Most are old and obvious, but there are some clever variants....
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account