acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Biden Signs New Cybersecurity Order
From Schneier on Security

Biden Signs New Cybersecurity Order

President Biden has signed a new cybersecurity order. It has a bunch of provisions, most notably using the US governments procurement power to improve cybersecurity...

Friday Squid Blogging: Opioid Alternatives from Squid Research
From Schneier on Security

Friday Squid Blogging: Opioid Alternatives from Squid Research

Is there nothing that squid research can’t solve? “If you’re working with an organism like squid that can edit genetic information way better than any other organism...

Social Engineering to Disable iMessage Protections
From Schneier on Security

Social Engineering to Disable iMessage Protections

I am always interested in new phishing tricks, and watching them spread across the ecosystem. A few days ago I started getting phishing SMS messages with a new...

FBI Deletes PlugX Malware from Thousands of Computers
From Schneier on Security

FBI Deletes PlugX Malware from Thousands of Computers

According to a DOJ press release, the FBI was able to delete the Chinese-used PlugX malware from “approximately 4,258 U.S.-based computers and networks.” Details...

Phishing False Alarm
From Schneier on Security

Phishing False Alarm

A very security-conscious company was hit with a (presumed) massive state-actor phishing attack with gift cards, and everyone rallied to combat it—until it turned...

Upcoming Speaking Engagements
From Schneier on Security

Upcoming Speaking Engagements

This is a current list of where and when I am scheduled to speak: I’m speaking on “AI: Trust & Power” at Capricon 45 in Chicago, Illinois, USA, at 11:30 AM onBoskone...

The First Password on the Internet
From Schneier on Security

The First Password on the Internet

It was created in 1973 by Peter Kirstein: So from the beginning I put password protection on my gateway. This had been done in such a way that even if UK users...

Microsoft Takes Legal Action Against AI “Hacking as a Service” Scheme
From Schneier on Security

Microsoft Takes Legal Action Against AI “Hacking as a Service” Scheme

Not sure this will matter in the end, but it’s a positive move: Microsoft is accusing three individuals of running a “hacking-as-a-service” scheme that was designed...

Friday Squid Blogging: Cotton-and-Squid-Bone Sponge
From Schneier on Security

Friday Squid Blogging: Cotton-and-Squid-Bone Sponge

News: A sponge made of cotton and squid bone that has absorbed about 99.9% of microplastics in water samples in China could provide an elusive answer to ubiquitous...

Apps That Are Spying on Your Location
From Schneier on Security

Apps That Are Spying on Your Location

404 Media is reporting on all the apps that are spying on your location, based on a hack of the location data company Gravy Analytics: The thousands of apps, included...

Zero-Day Vulnerability in Ivanti VPN
From Schneier on Security

Zero-Day Vulnerability in Ivanti VPN

It’s being actively exploited.

US Treasury Department Sanctions Chinese Company Over Cyberattacks
From Schneier on Security

US Treasury Department Sanctions Chinese Company Over Cyberattacks

From the Washington Post: The sanctions target Beijing Integrity Technology Group, which U.S. officials say employed workers responsible for the Flax Typhoon attacks...

Friday Squid Blogging: Anniversary Post
From Schneier on Security

Friday Squid Blogging: Anniversary Post

I made my first squid post nineteen years ago this week. Between then and now, I posted something about squid every week (with maybe only a few exceptions). There...

ShredOS
From Schneier on Security

ShredOS

ShredOS is a stripped-down operating system designed to destroy data. GitHub page here.

Google Is Allowing Device Fingerprinting
From Schneier on Security

Google Is Allowing Device Fingerprinting

Lukasz Olejnik writes about device fingerprinting, and why Google’s policy change to allow it in 2025 is a major privacy setback.

Gift Card Fraud
From Schneier on Security

Gift Card Fraud

It’s becoming an organized crime tactic: Card draining is when criminals remove gift cards from a store display, open them in a separate location, and either record...

Casino Players Using Hidden Cameras for Cheating
From Schneier on Security

Casino Players Using Hidden Cameras for Cheating

The basic strategy is to place a device with a hidden camera in a position to capture normally hidden card values, which are interpreted by an accomplice off-site...

Friday Squid Blogging: Squid on Pizza
From Schneier on Security

Friday Squid Blogging: Squid on Pizza

Pizza Hut in Taiwan has a history of weird pizzas, including a “2022 scalloped pizza with Oreos around the edge, and deep-fried chicken and calamari studded throughout...

Scams Based on Fake Google Emails
From Schneier on Security

Scams Based on Fake Google Emails

Scammers are hacking Google Forms to send email to victims that come from google.com. Brian Krebs reports on the effects. Boing Boing post.

Spyware Maker NSO Group Found Liable for Hacking WhatsApp
From Schneier on Security

Spyware Maker NSO Group Found Liable for Hacking WhatsApp

A judge has found that NSO Group, maker of the Pegasus spyware, has violated the US Computer Fraud and Abuse Act by hacking WhatsApp in order to spy on people using...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account