Sign In

Communications of the ACM

Blogroll



Half a Million IoT Device Passwords Published
From Schneier on Security

Half a Million IoT Device Passwords Published

It's a list of easy-to-guess passwords for IoT devices on the Internet as recently as last October and November. Useful for anyone putting together a bot network...

Brazil Charges Glenn Greenwald with Cybercrimes
From Schneier on Security

Brazil Charges Glenn Greenwald with Cybercrimes

Glenn Greenwald has been charged with cybercrimes in Brazil, stemming from publishing information and documents that were embarrassing to the government. The charges...

SIM Hijacking
From Schneier on Security

SIM Hijacking

SIM hijacking -- or SIM swapping -- is an attack where a fraudster contacts your cell phone provider and convinces them to switch your account to a phone that they...

Clearview AI and Facial Recognition
From Schneier on Security

Clearview AI and Facial Recognition

The New York Times has a long story about Clearview AI, a small company that scrapes identified photos of people from pretty much everywhere, and then uses unstated...

Friday Squid Blogging: Giant Squid Genome Analyzed
From Schneier on Security

Friday Squid Blogging: Giant Squid Genome Analyzed

This is fantastic work: In total, the researchers identified approximately 2.7 billion DNA base pairs, which is around 90 percent the size of the human genome....

Securing Tiffany's Move
From Schneier on Security

Securing Tiffany's Move

Story of how Tiffany & Company moved all of its inventory from one store to another. Short summary: careful auditing and a lot of police....

Critical Windows Vulnerability Discovered by NSA
From Schneier on Security

Critical Windows Vulnerability Discovered by NSA

Yesterday's Microsoft Windows patches included a fix for a critical vulnerability in the system's crypto library. A spoofing vulnerability exists in the way Windows...

Upcoming Speaking Engagements
From Schneier on Security

Upcoming Speaking Engagements

This is a current list of where and when I am scheduled to speak: I'm speaking at Indiana University Bloomington on January 30, 2020. I'll be at RSA Conference...

5G Security
From Schneier on Security

5G Security

The security risks inherent in Chinese-made 5G networking equipment are easy to understand. Because the companies that make the equipment are subservient to the...

Artificial Personas and Public Discourse
From Schneier on Security

Artificial Personas and Public Discourse

Presidential-campaign season is officially, officially, upon us now, which means it's time to confront the weird and insidious ways in which technology is warping...

Friday Squid Blogging: Stuffed Squid with Vegetables and Pancetta
From Schneier on Security

Friday Squid Blogging: Stuffed Squid with Vegetables and Pancetta

A Croatian recipe. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines...

Police Surveillance Tools from Special Services Group
From Schneier on Security

Police Surveillance Tools from Special Services Group

Special Services Group, a company that sells surveillance tools to the FBI, DEA, ICE, and other US government agencies, has had its secret sales brochure published...

New SHA-1 Attack
From Schneier on Security

New SHA-1 Attack

There's a new, practical, collision attack against SHA-1: In this paper, we report the first practical implementation of this attack, and its impact on real-world...

USB Cable Kill Switch for Laptops
From Schneier on Security

USB Cable Kill Switch for Laptops

BusKill is designed to wipe your laptop (Linux only) if it is snatched from you in a public place: The idea is to connect the BusKill cable to your Linux laptop...

Mailbox Master Keys
From Schneier on Security

Mailbox Master Keys

Here's a physical-world example of why master keys are a bad idea. It's a video of two postal thieves using a master key to open apartment building mailboxes. Changing...

Friday Squid Blogging: Giant Squid Video from the Gulf of Mexico
From Schneier on Security

Friday Squid Blogging: Giant Squid Video from the Gulf of Mexico

Fantastic video: Scientists had used a specialized camera system developed by Widder called the Medusa, which uses red light undetectable to deep sea creatures...

Chrome Extension Stealing Cryptocurrency Keys and Passwords
From Schneier on Security

Chrome Extension Stealing Cryptocurrency Keys and Passwords

A malicious Chrome extension surreptitiously steals Ethereum keys and passwords: According to Denley, the extension is dangerous to users in two ways. First, any...

Mysterious Drones are Flying over Colorado
From Schneier on Security

Mysterious Drones are Flying over Colorado

No one knows who they belong to. (Well, of course someone knows. And my guess is that it's likely that we will know soon.)...

Hacking School Surveillance Systems
From Schneier on Security

Hacking School Surveillance Systems

Lance Vick suggesting that students hack their schools' surveillance systems. "This is an ethical minefield that I feel students would be well within their rights...

Friday Squid Blogging: New Species of Bobtail Squid
From Schneier on Security

Friday Squid Blogging: New Species of Bobtail Squid

Euprymna brenneri was discovered in the waters of Okinawa. As usual, you can also use this squid post to talk about the security stories in the news that I haven't...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account