acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

New Chrome Zero-Day
From Schneier on Security

New Chrome Zero-Day

According to Microsoft researchers, North Korean hackers have been using a Chrome zero-day exploit to steal cryptocurrency.

Australia Threatens to Force Companies to Break Encryption
From Schneier on Security

Australia Threatens to Force Companies to Break Encryption

In 2018, Australia passed the Assistance and Access Act, which—among other things—gave the government the power to force companies to break their own encryption...

Live Video of Promachoteuthis Squid
From Schneier on Security

Live Video of Promachoteuthis Squid

The first live video of the Promachoteuthis squid, filmed at a newly discovered seamount off the coast of Chile. Blog moderation policy.

YubiKey Side-Channel Attack
From Schneier on Security

YubiKey Side-Channel Attack

There is a side-channel attack against YubiKey access tokens that allows someone to clone a device. It’s a complicated attack, requiring the victim’s username and...

Long Analysis of the M-209
From Schneier on Security

Long Analysis of the M-209

Really interesting analysis of the American M-209 encryption device and its security.

Security Researcher Sued for Disproving Government Statements
From Schneier on Security

Security Researcher Sued for Disproving Government Statements

This story seems straightforward. A city is the victim of a ransomware attack. They repeatedly lie to the media about the severity of the breach. A security researcher...

List of Old NSA Training Videos
From Schneier on Security

List of Old NSA Training Videos

The NSA’s “National Cryptographic School Television Catalogue” from 1991 lists about 600 COMSEC and SIGINT training videos. There are a bunch explaining the operations...

SQL Injection Attack on Airport Security
From Schneier on Security

SQL Injection Attack on Airport Security

Interesting vulnerability: …a special lane at airport security called Known Crewmember (KCM). KCM is a TSA program that allows pilots and flight attendants toVarious...

Friday Squid Blogging: Economic Fallout from Falklands Halting Squid Fishing
From Schneier on Security

Friday Squid Blogging: Economic Fallout from Falklands Halting Squid Fishing

Details. Blog moderation policy.

The Present and Future of TV Surveillance
From Schneier on Security

The Present and Future of TV Surveillance

Ars Technica has a good article on what’s happening in the world of television surveillance. More than even I realized.

US Federal Court Rules Against Geofence Warrants
From Schneier on Security

US Federal Court Rules Against Geofence Warrants

This is a big deal. A US Appeals Court ruled that geofence warrants—these are general warrants demanding information about all people within a geographical boundary...

Friday Squid Blogging: Self-Healing Materials from Squid Teeth
From Schneier on Security

Friday Squid Blogging: Self-Healing Materials from Squid Teeth

Making self-healing materials based on the teeth in squid suckers. Blog moderation policy.

Take a Selfie Using a NY Surveillance Camera
From Schneier on Security

Take a Selfie Using a NY Surveillance Camera

This site will let you take a selfie with a New York City traffic surveillance camera.

Surveillance Watch
From Schneier on Security

Surveillance Watch

This is a fantastic project mapping the global surveillance industry.

Story of an Undercover CIA Agent who Penetrated Al Qaeda
From Schneier on Security

Story of an Undercover CIA Agent who Penetrated Al Qaeda

Rolling Stone has a long investigative story (non-paywalled version here) about a CIA agent who spent years posing as an Islamic radical. Unrelated, but also in...

Hacking Wireless Bicycle Shifters
From Schneier on Security

Hacking Wireless Bicycle Shifters

This is yet another insecure Internet-of-things story, this one about wireless gear shifters for bicycles. These gear shifters are used in big-money professional...

The State of Ransomware
From Schneier on Security

The State of Ransomware

Palo Alto Networks published its semi-annual report on ransomware. From the Executive Summary: Unit 42 monitors ransomware and extortion leak sites closely to...

Friday Squid Blog: The Market for Squid Oil Is Growing
From Schneier on Security

Friday Squid Blog: The Market for Squid Oil Is Growing

How did I not know before now that there was a market for squid oil? The squid oil market has experienced robust growth in recent years, expanding from $4.56 billion...

New Windows IPv6 Zero-Click Vulnerability
From Schneier on Security

New Windows IPv6 Zero-Click Vulnerability

The press is reporting a critical Windows vulnerability affecting IPv6. As Microsoft explained in its Tuesday advisory, unauthenticated attackers can exploit the...

NIST Releases First Post-Quantum Encryption Algorithms
From Schneier on Security

NIST Releases First Post-Quantum Encryption Algorithms

From the Federal Register: After three rounds of evaluation and analysis, NIST selected four algorithms it will standardize as a result of the PQC Standardization...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account