acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
datePast Week
authorschneier
bg-corner

Slopsquatting
From Schneier on Security

Slopsquatting

As AI coding assistants invent nonexistent software libraries to download and use, enterprising attackers create and upload libraries with those names—laced with...

Upcoming Speaking Engagements
From Schneier on Security

Upcoming Speaking Engagements

This is a current list of where and when I am scheduled to speak: I’m giving an online talk on AI and trust for the Weizenbaum Institute on April 24, 2025 at 2...

China Sort of Admits to Being Behind Volt Typhoon
From Schneier on Security

China Sort of Admits to Being Behind Volt Typhoon

The Wall Street Journal has the story: Chinese officials acknowledged in a secret December meeting that Beijing was behind a widespread series of alarming cyberattacks...

Friday Squid Blogging: Squid and Efficient Solar Tech
From Schneier on Security

Friday Squid Blogging: Squid and Efficient Solar Tech

Researchers are trying to use squid color-changing biochemistry for solar tech. This appears to be new and related research to a 2019 squid post. As usual, you...

AI Vulnerability Finding
From Schneier on Security

AI Vulnerability Finding

Microsoft is reporting that its AI systems are able to find new vulnerabilities in source code: Microsoft discovered eleven vulnerabilities in GRUB2, including...

Reimagining Democracy
From Schneier on Security

Reimagining Democracy

Imagine that all of us—all of society—have landed on some alien planet and need to form a government: clean slate. We do not have any legacy systems from the United...

How to Leak to a Journalist
From Schneier on Security

How to Leak to a Journalist

Neiman Lab has some good advice on how to leak a story to a journalist.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account