acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

FBI Shuts Down Chinese Botnet
From Schneier on Security

FBI Shuts Down Chinese Botnet

The FBI has shut down a botnet run by Chinese hackers: The botnet malware infected a number of different types of internet-connected devices around the world,...

Remotely Exploding Pagers
From Schneier on Security

Remotely Exploding Pagers

Wow. It seems they all exploded simultaneously, which means they were triggered. Were they each tampered with physically, or did someone figure out how to trigger...

Python Developers Targeted with Malware During Fake Job Interviews
From Schneier on Security

Python Developers Targeted with Malware During Fake Job Interviews

Interesting social engineering attack: luring potential job applicants with fake recruiting pitches, trying to convince them to download malware. From a news article...

Legacy Ivanti Cloud Service Appliance Being Exploited
From Schneier on Security

Legacy Ivanti Cloud Service Appliance Being Exploited

CISA wants everyone—and government agencies in particular—to remove or upgrade an Ivanti Cloud Service Appliance (CSA) that is no longer being supported. Welcome...

Upcoming Speaking Engagements
From Schneier on Security

Upcoming Speaking Engagements

This is a current list of where and when I am scheduled to speak: I’m speaking at eCrime 2024 in Boston, Massachusetts, USA. The event runs from September 24 through...

Friday Squid Blogging: Squid as a Legislative Negotiating Tactic
From Schneier on Security

Friday Squid Blogging: Squid as a Legislative Negotiating Tactic

This is an odd story of serving squid during legislative negotiations in the Philippines.

My TedXBillings Talk
From Schneier on Security

My TedXBillings Talk

Over the summer, I gave a talk about AI and democracy at TedXBillings. The recording is <a href="https://www.youtube.com/watch?v=uqC4nb7fLpY”>live. Please share...

Microsoft Is Adding New Cryptography Algorithms
From Schneier on Security

Microsoft Is Adding New Cryptography Algorithms

Microsoft is updating SymCrypt, its core cryptographic library, with new quantum-secure algorithms. Microsoft’s details are here. From a news article: The first...

Evaluating the Effectiveness of Reward Modeling of Generative AI Systems
From Schneier on Security

Evaluating the Effectiveness of Reward Modeling of Generative AI Systems

New research evaluating the effectiveness of reward modeling during Reinforcement Learning from Human Feedback (RLHF): “SEAL: Systematic Error Analysis for Value...

New Chrome Zero-Day
From Schneier on Security

New Chrome Zero-Day

According to Microsoft researchers, North Korean hackers have been using a Chrome zero-day exploit to steal cryptocurrency.

Australia Threatens to Force Companies to Break Encryption
From Schneier on Security

Australia Threatens to Force Companies to Break Encryption

In 2018, Australia passed the Assistance and Access Act, which—among other things—gave the government the power to force companies to break their own encryption...

Live Video of Promachoteuthis Squid
From Schneier on Security

Live Video of Promachoteuthis Squid

The first live video of the Promachoteuthis squid, filmed at a newly discovered seamount off the coast of Chile. Blog moderation policy.

YubiKey Side-Channel Attack
From Schneier on Security

YubiKey Side-Channel Attack

There is a side-channel attack against YubiKey access tokens that allows someone to clone a device. It’s a complicated attack, requiring the victim’s username and...

Long Analysis of the M-209
From Schneier on Security

Long Analysis of the M-209

Really interesting analysis of the American M-209 encryption device and its security.

Security Researcher Sued for Disproving Government Statements
From Schneier on Security

Security Researcher Sued for Disproving Government Statements

This story seems straightforward. A city is the victim of a ransomware attack. They repeatedly lie to the media about the severity of the breach. A security researcher...

List of Old NSA Training Videos
From Schneier on Security

List of Old NSA Training Videos

The NSA’s “National Cryptographic School Television Catalogue” from 1991 lists about 600 COMSEC and SIGINT training videos. There are a bunch explaining the operations...

SQL Injection Attack on Airport Security
From Schneier on Security

SQL Injection Attack on Airport Security

Interesting vulnerability: …a special lane at airport security called Known Crewmember (KCM). KCM is a TSA program that allows pilots and flight attendants toVarious...

Friday Squid Blogging: Economic Fallout from Falklands Halting Squid Fishing
From Schneier on Security

Friday Squid Blogging: Economic Fallout from Falklands Halting Squid Fishing

Details. Blog moderation policy.

The Present and Future of TV Surveillance
From Schneier on Security

The Present and Future of TV Surveillance

Ars Technica has a good article on what’s happening in the world of television surveillance. More than even I realized.

US Federal Court Rules Against Geofence Warrants
From Schneier on Security

US Federal Court Rules Against Geofence Warrants

This is a big deal. A US Appeals Court ruled that geofence warrants—these are general warrants demanding information about all people within a geographical boundary...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account