acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
datePast Week
authorBruce Schneier
bg-corner

Friday Squid Blogging: Squid Werewolf Hacking Group
From Schneier on Security

Friday Squid Blogging: Squid Werewolf Hacking Group

In another rare squid/cybersecurity intersection, APT37 is also known as “Squid Werewolf.” As usual, you can also use this squid post to talk about the security...

AIs as Trusted Third Parties
From Schneier on Security

AIs as Trusted Third Parties

This is a truly fascinating paper: “Trusted Machine Learning Models Unlock Private Inference for Problems Currently Infeasible with Cryptography.” The basic idea...

A Taxonomy of Adversarial Machine Learning Attacks and Mitigations
From Schneier on Security

A Taxonomy of Adversarial Machine Learning Attacks and Mitigations

NIST just released a comprehensive taxonomy of adversarial machine learning attacks and countermeasures.

AI Data Poisoning
From Schneier on Security

AI Data Poisoning

Cloudflare has a new feature—available to free users as well—that uses AI to generate random pages to feed to AI web crawlers: Instead of simply blocking bots,...

Report on Paragon Spyware
From Schneier on Security

Report on Paragon Spyware

Citizen Lab has a new report on Paragon’s spyware: Key Findings: Introducing Paragon Solutions. Paragon Solutions was founded in Israel in 2019 and sells spyware...

More Countries are Demanding Back-Doors to Encrypted Apps
From Schneier on Security

More Countries are Demanding Back-Doors to Encrypted Apps

Last month I wrote about the UK forcing Apple to break its Advanced Data Protection encryption in iCloud. More recently, both Sweden and France are contemplating...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account