acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Hacking  Robots
From Schneier on Security

Hacking Robots

Researchers have demonstrated hacks against robots, taking over and controlling their camera, speakers, and movements. News article....

On the Equifax Data Breach
From Schneier on Security

On the Equifax Data Breach

Last Thursday, Equifax reported a data breach that affects 143 million US customers, about 44% of the population. It's an extremely serious breach; hackers got...

Hacking Voice Assistant Systems with Inaudible Voice Commands
From Schneier on Security

Hacking Voice Assistant Systems with Inaudible Voice Commands

Turns out that all the major voice assistants -- Siri, Google Now, Samsung S Voice, Huawei HiVoice, Cortana and Alexa -- listen at audio frequencies the human ear...

Securing a Raspberry Pi
From Schneier on Security

Securing a Raspberry Pi

A Raspberry Pi is a tiny computer designed for markers and all sorts of Internet-of-Things types of projects. Make magazine has an article about securing it. Reading...

A Hardware Privacy Monitor for iPhones
From Schneier on Security

A Hardware Privacy Monitor for iPhones

Andrew "bunnie" Huang and Edward Snowden have designed a hardware device that attaches to an iPhone and monitors it for malicious surveillance activities, even...

Friday Squid Blogging: Make-Your-Own Squid Candy
From Schneier on Security

Friday Squid Blogging: Make-Your-Own Squid Candy

It's Japanese. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines...

ShadowBrokers Releases NSA UNITEDRAKE Manual
From Schneier on Security

ShadowBrokers Releases NSA UNITEDRAKE Manual

The ShadowBrokers released the manual for UNITEDRAKE, a sophisticated NSA Trojan that targets Windows machines: Able to compromise Windows PCs running on XP, Windows...

Research on What Motivates ISIS -- and Other -- Fighters
From Schneier on Security

Research on What Motivates ISIS -- and Other -- Fighters

Interesting research from Nature Human Behaviour: "The devoted actor's will to fight and the spiritual dimension of human conflict": Abstract: Frontline investigations...

Security Vulnerabilities in AT&T Routers
From Schneier on Security

Security Vulnerabilities in AT&T Routers

They're actually Arris routers, sold or given away by AT&T. There are several security vulnerabilities, some of them very serious. They can be fixed, but because...

Security Flaw in Estonian National ID Card
From Schneier on Security

Security Flaw in Estonian National ID Card

We have no idea how bad this really is: On 30 August, an international team of researchers informed the Estonian Information System Authority (RIA) of a vulnerability...

New Techniques in Fake Reviews
From Schneier on Security

New Techniques in Fake Reviews

Research paper: "Automated Crowdturfing Attacks and Defenses in Online Review Systems." Abstract: Malicious crowdsourcing forums are gaining traction as sources...

Friday Squid Blogging: Bioluminescent Squid
From Schneier on Security

Friday Squid Blogging: Bioluminescent Squid

There's a beautiful picture of a tiny squid in this New York Times article on bioluminescence -- and a dramatic one of a vampire squid. As usual, you can also use...

Russian Hacking Tools Codenamed WhiteBear Released
From Schneier on Security

Russian Hacking Tools Codenamed WhiteBear Released

Kaspersky Labs released a highly sophisticated set of hacking tools from Russia called WhiteBear. From February to September 2016, WhiteBear activity was narrowly...

Journalists Generally Do Not Use Secure Communication
From Schneier on Security

Journalists Generally Do Not Use Secure Communication

This should come as no surprise: Alas, our findings suggest that secure communications haven't yet attracted mass adoption among journalists. We looked at 2,515...

A Framework for Cyber Security Insurance
From Schneier on Security

A Framework for Cyber Security Insurance

New paper: "Policy measures and cyber insurance: a framework," by Daniel Woods and Andrew Simpson, Journal of Cyber Policy, 2017. Abstract: The role of the insurance...

Proof that HMAC-DRBG has No Back Doors
From Schneier on Security

Proof that HMAC-DRBG has No Back Doors

New research: "Verified Correctness and Security of mbedTLS HMAC-DRBG," by Katherine Q. Ye, Matthew Green, Naphat Sanguansin, Lennart Beringer, Adam Petcher, and...

The NSA's 2014 Media Engagement and Outreach Plan
From Schneier on Security

The NSA's 2014 Media Engagement and Outreach Plan

Interesting post-Snowden reading, just declassified. (U) External Communication will address at least one of "fresh look" narratives: (U) NSA does not access everything...

Ross Anderson on the History of the Crypto Wars in the UK
From Schneier on Security

Ross Anderson on the History of the Crypto Wars in the UK

Ross Anderson gave a talk on the history of the Crypto Wars in the UK. I am intimately familiar with the US story, but didn't know as much about Britain's verson...

Hacking a Phone Through a Replacement Touchscreen
From Schneier on Security

Hacking a Phone Through a Replacement Touchscreen

Researchers demonstrated a really clever hack: they hid malware in a replacement smart phone screen. The idea is that you would naively bring your smart phone in...

Friday Squid Blogging: Prehistoric Dolphins that Ate Squid
From Schneier on Security

Friday Squid Blogging: Prehistoric Dolphins that Ate Squid

Paleontologists have discovered a prehistoric toothless dolphin that fed by vacuuming up squid: There actually are modern odontocetes that don't really use their...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account