acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
datePast Year
authorschneier
bg-corner

Upcoming Speaking Engagements
From Schneier on Security

Upcoming Speaking Engagements

This is a current list of where and when I am scheduled to speak: I’m speaking at the Munich Security Conference (MSC) 2024 in Munich, Germany, on Friday, February...

Improving the Cryptanalysis of Lattice-Based Public-Key Algorithms
From Schneier on Security

Improving the Cryptanalysis of Lattice-Based Public-Key Algorithms

The winner of the Best Paper Award at Crypto this year was a significant improvement to lattice-based cryptanalysis. This is important, because a bunch of NIST’s...

Molly White Reviews Blockchain Book
From Schneier on Security

Molly White Reviews Blockchain Book

Molly White—of “Web3 is Going Just Great” fame—reviews Chris Dixon’s blockchain solutions book: Read Write Own: In fact, throughout the entire book, Dixon fails...

On Passkey Usability
From Schneier on Security

On Passkey Usability

Matt Burgess tries to only use passkeys. The results are mixed.

Friday Squid Blogging: A Penguin Named “Squid”
From Schneier on Security

Friday Squid Blogging: A Penguin Named “Squid”

Amusing story about a penguin named “Squid.” As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read...

No, Toothbrushes Were Not Used in a Massive DDoS Attack
From Schneier on Security

No, Toothbrushes Were Not Used in a Massive DDoS Attack

The widely reported story last week that 1.5 million smart toothbrushes were hacked and used in a DDoS attack is false. Near as I can tell, a German reporter talking...

On Software Liabilities
From Schneier on Security

On Software Liabilities

Over on Lawfare, Jim Dempsey published a really interesting proposal for software liability: “Standard for Software Liability: Focus on the Product for Liability...

Teaching LLMs to Be Deceptive
From Schneier on Security

Teaching LLMs to Be Deceptive

Interesting research: “Sleeper Agents: Training Deceptive LLMs that Persist Through Safety Training“: Abstract: Humans are capable of strategically deceptive behavior...

Deepfake Fraud
From Schneier on Security

Deepfake Fraud

A deepfake video conference call—with everyone else on the call a fake—fooled a finance worker into sending $25M to the criminals’ account.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account