acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

CISA Under Trump
From Schneier on Security

CISA Under Trump

Jen Easterly is out as the Director of CISA. Read her final interview: There’s a lot of unfinished business. We have made an impact through our ransomware vulnerability...

New VPN Backdoor
From Schneier on Security

New VPN Backdoor

A newly discovered VPN backdoor uses some interesting tactics to avoid detection: When threat actors use backdoor malware to gain access to a network, they want...

Friday Squid Blogging: Beaked Whales Feed on Squid
From Schneier on Security

Friday Squid Blogging: Beaked Whales Feed on Squid

A Travers’ beaked whale (Mesoplodon traversii) washed ashore in New Zealand, and scientists conlcuded that “the prevalence of squid remains [in its stomachs] suggests...

Third Interdisciplinary Workshop on Reimagining Democracy (IWORD 2024)
From Schneier on Security

Third Interdisciplinary Workshop on Reimagining Democracy (IWORD 2024)

Last month, Henry Farrell and I convened the Third Interdisciplinary Workshop on Reimagining Democracy (IWORD 2024) at Johns Hopkins University’s Bloomberg Center...

AI Will Write Complex Laws
From Schneier on Security

AI Will Write Complex Laws

Artificial intelligence (AI) is writing law today. This has required no changes in legislative procedure or the rules of legislative bodies—all it takes is onelegislatures...

AI Mistakes Are Very Different from Human Mistakes
From Schneier on Security

AI Mistakes Are Very Different from Human Mistakes

Humans make mistakes all the time. All of us do, every day, in tasks both new and routine. Some of our mistakes are minor and some are catastrophic. Mistakes can...

Biden Signs New Cybersecurity Order
From Schneier on Security

Biden Signs New Cybersecurity Order

President Biden has signed a new cybersecurity order. It has a bunch of provisions, most notably using the US governments procurement power to improve cybersecurity...

Friday Squid Blogging: Opioid Alternatives from Squid Research
From Schneier on Security

Friday Squid Blogging: Opioid Alternatives from Squid Research

Is there nothing that squid research can’t solve? “If you’re working with an organism like squid that can edit genetic information way better than any other organism...

Social Engineering to Disable iMessage Protections
From Schneier on Security

Social Engineering to Disable iMessage Protections

I am always interested in new phishing tricks, and watching them spread across the ecosystem. A few days ago I started getting phishing SMS messages with a new...

FBI Deletes PlugX Malware from Thousands of Computers
From Schneier on Security

FBI Deletes PlugX Malware from Thousands of Computers

According to a DOJ press release, the FBI was able to delete the Chinese-used PlugX malware from “approximately 4,258 U.S.-based computers and networks.” Details...

Phishing False Alarm
From Schneier on Security

Phishing False Alarm

A very security-conscious company was hit with a (presumed) massive state-actor phishing attack with gift cards, and everyone rallied to combat it—until it turned...

Upcoming Speaking Engagements
From Schneier on Security

Upcoming Speaking Engagements

This is a current list of where and when I am scheduled to speak: I’m speaking on “AI: Trust & Power” at Capricon 45 in Chicago, Illinois, USA, at 11:30 AM onBoskone...

The First Password on the Internet
From Schneier on Security

The First Password on the Internet

It was created in 1973 by Peter Kirstein: So from the beginning I put password protection on my gateway. This had been done in such a way that even if UK users...

Microsoft Takes Legal Action Against AI “Hacking as a Service” Scheme
From Schneier on Security

Microsoft Takes Legal Action Against AI “Hacking as a Service” Scheme

Not sure this will matter in the end, but it’s a positive move: Microsoft is accusing three individuals of running a “hacking-as-a-service” scheme that was designed...

Friday Squid Blogging: Cotton-and-Squid-Bone Sponge
From Schneier on Security

Friday Squid Blogging: Cotton-and-Squid-Bone Sponge

News: A sponge made of cotton and squid bone that has absorbed about 99.9% of microplastics in water samples in China could provide an elusive answer to ubiquitous...

Apps That Are Spying on Your Location
From Schneier on Security

Apps That Are Spying on Your Location

404 Media is reporting on all the apps that are spying on your location, based on a hack of the location data company Gravy Analytics: The thousands of apps, included...

Zero-Day Vulnerability in Ivanti VPN
From Schneier on Security

Zero-Day Vulnerability in Ivanti VPN

It’s being actively exploited.

US Treasury Department Sanctions Chinese Company Over Cyberattacks
From Schneier on Security

US Treasury Department Sanctions Chinese Company Over Cyberattacks

From the Washington Post: The sanctions target Beijing Integrity Technology Group, which U.S. officials say employed workers responsible for the Flax Typhoon attacks...

Friday Squid Blogging: Anniversary Post
From Schneier on Security

Friday Squid Blogging: Anniversary Post

I made my first squid post nineteen years ago this week. Between then and now, I posted something about squid every week (with maybe only a few exceptions). There...

ShredOS
From Schneier on Security

ShredOS

ShredOS is a stripped-down operating system designed to destroy data. GitHub page here.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account