acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorBruce Schneier
bg-corner

Fooling a Voice Authentication System with an AI-Generated Voice
From Schneier on Security

Fooling a Voice Authentication System with an AI-Generated Voice

A reporter used an AI synthesis of his own voice to fool the voice authentication system for Lloyd’s Bank.

Side-Channel Attack against CRYSTALS-Kyber
From Schneier on Security

Side-Channel Attack against CRYSTALS-Kyber

CRYSTALS-Kyber is one of the public-key algorithms currently recommended by NIST as part of its post-quantum cryptography standardization process. Researchers have...

Banning TikTok
From Schneier on Security

Banning TikTok

Congress is currently debating bills that would ban TikTok in the United States. We are here as technologists to tell you that this is a terrible idea and the side...

Friday Squid Blogging: Squid Processing Facility
From Schneier on Security

Friday Squid Blogging: Squid Processing Facility

This video of a modern large squid processing ship is a bit gory, but also interesting. As usual, you can also use this squid post to talk about the security stories...

Putting Undetectable Backdoors in Machine Learning Models
From Schneier on Security

Putting Undetectable Backdoors in Machine Learning Models

This is really interesting research from a few months ago: Abstract: Given the computational cost and technical expertise required to train machine learning models...

Cyberwar Lessons from the War in Ukraine
From Schneier on Security

Cyberwar Lessons from the War in Ukraine

The Aspen Institute has published a good analysis of the successes, failures, and absences of cyberattacks as part of the current war in Ukraine: “The Cyber Defense...

A Device to Turn Traffic Lights Green
From Schneier on Security

A Device to Turn Traffic Lights Green

Here’s a story about a hacker who reprogrammed a device called “Flipper Zero” to mimic Opticom transmitters—to turn traffic lights in his path green. As mentioned...

The Insecurity of Photo Cropping
From Schneier on Security

The Insecurity of Photo Cropping

The Intercept has a long article on the insecurity of photo cropping: One of the hazards lies in the fact that, for some of the programs, downstream crop reversals...

Fines as a Security System
From Schneier on Security

Fines as a Security System

Tile has an interesting security solution to make its tracking tags harder to use for stalking: The Anti-Theft Mode feature will make the devices invisible to Scan...

Friday Squid Blogging: Thermal Batteries from Squid Proteins
From Schneier on Security

Friday Squid Blogging: Thermal Batteries from Squid Proteins

Researchers are making thermal batteries from “a synthetic material that’s derived from squid ring teeth protein.” As usual, you can also use this squid post to...

Defending against AI Lobbyists
From Schneier on Security

Defending against AI Lobbyists

When is it time to start worrying about artificial intelligence interfering in our democracy? Maybe when an AI writes a letter to The New York Times opposing the...

ChatGPT Is Ingesting Corporate Secrets
From Schneier on Security

ChatGPT Is Ingesting Corporate Secrets

Interesting: According to internal Slack messages that were leaked to Insider, an Amazon lawyer told workers that they had “already seen instances” of text generated...

Camera the Size of a Grain of Salt
From Schneier on Security

Camera the Size of a Grain of Salt

Cameras are getting smaller and smaller, changing the scale and scope of surveillance.

What Will It Take?
From Schneier on Security

What Will It Take?

What will it take for policy makers to take cybersecurity seriously? Not minimal-change seriously. Not here-and-there seriously. But really seriously. What will...

On Pig Butchering Scams
From Schneier on Security

On Pig Butchering Scams

“Pig butchering” is the colorful name given to online cons that trick the victim into giving money to the scammer, thinking it is an investment opportunity. It’s...

Friday Squid Blogging: Squid Is a Blockchain Thingy
From Schneier on Security

Friday Squid Blogging: Squid Is a Blockchain Thingy

I had no idea—until I read this incredibly jargon-filled article: Squid is a cross-chain liquidity and messaging router that swaps across multiple chains and their...

Hacking the Tax Code
From Schneier on Security

Hacking the Tax Code

The tax code isn’t software. It doesn’t run on a computer. But it’s still code. It’s a series of algorithms that takes an input—financial information for the year...

Mary Queen of Scots Letters Decrypted
From Schneier on Security

Mary Queen of Scots Letters Decrypted

This is a neat piece of historical research. The team of computer scientist George Lasry, pianist Norbert Biermann and astrophysicist Satoshi Tomokiyo—all keen...

SolarWinds and Market Incentives
From Schneier on Security

SolarWinds and Market Incentives

In early 2021, IEEE Security and Privacy asked a number of board members for brief perspectives on the SolarWinds incident while it was still breaking news. This...

Malware Delivered through Google Search
From Schneier on Security

Malware Delivered through Google Search

Criminals using Google search ads to deliver malware isn’t new, but Ars Technica declared that the problem has become much worse recently. The surge is coming from...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account