acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorBruce Schneier
bg-corner

The Future of Drone Warfare
From Schneier on Security

The Future of Drone Warfare

Ukraine is using $400 drones to destroy tanks: Facing an enemy with superior numbers of troops and armor, the Ukrainian defenders are holding on with the help...

Hacking Scandinavian Alcohol Tax
From Schneier on Security

Hacking Scandinavian Alcohol Tax

The islands of Åland are an important tax hack: Although Åland is part of the Republic of Finland, it has its own autonomous parliament. In areas where Åland has...

Friday Squid Blogging: On the Ugliness of Squid Fishing
From Schneier on Security

Friday Squid Blogging: On the Ugliness of Squid Fishing

And seafood in general: A squid ship is a bustling, bright, messy place. The scene on deck looks like a mechanic’s garage where an oil change has gone terribly...

Messaging Service Wiretap Discovered through Expired TLS Cert
From Schneier on Security

Messaging Service Wiretap Discovered through Expired TLS Cert

Fascinating story of a covert wiretap that was discovered because of an expired TLS certificate: The suspected man-in-the-middle attack was identified when the...

New NSA Information from (and About) Snowden
From Schneier on Security

New NSA Information from (and About) Snowden

Interesting article about the Snowden documents, including comments from former Guardian editor Ewen MacAskill MacAskill, who shared the Pulitzer Prize for Public...

Microsoft is Soft-Launching Security Copilot
From Schneier on Security

Microsoft is Soft-Launching Security Copilot

Microsoft has announced an early access program for its LLM-based security chatbot assistant: Security Copilot. I am curious whether this thing is actually useful...

Child Exploitation and the Crypto Wars
From Schneier on Security

Child Exploitation and the Crypto Wars

Susan Landau published an excellent essay on the current justification for the government breaking end-to-end-encryption: child sexual abuse and exploitation (CSAE)...

Friday Squid Blogging: Why There Are No Giant Squid in Aquariums
From Schneier on Security

Friday Squid Blogging: Why There Are No Giant Squid in Aquariums

They’re too big and we can’t recreate their habitat. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered...

AI and US Election Rules
From Schneier on Security

AI and US Election Rules

If an AI breaks the rules for you, does that count as breaking the rules? This is the essential question being taken up by the Federal Election Commission thisAI...

Former Uber CISO Appealing His Conviction
From Schneier on Security

Former Uber CISO Appealing His Conviction

Joe Sullivan, Uber’s CEO during their 2016 data breach, is appealing his conviction. Prosecutors charged Sullivan, whom Uber hired as CISO after the 2014 breach...

Coin Flips Are Biased
From Schneier on Security

Coin Flips Are Biased

Experimental result: Many people have flipped coins but few have stopped to ponder the statistical and physical intricacies of the process. In a preregistered study...

Friday Squid Blogging: On Squid Intelligence
From Schneier on Security

Friday Squid Blogging: On Squid Intelligence

Article about squid intelligence. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog...

Hacking the High School Grading System
From Schneier on Security

Hacking the High School Grading System

Interesting New York Times article about high-school students hacking the grading system. What’s not helping? The policies many school districts are adopting that...

Model Extraction Attack on Neural Networks
From Schneier on Security

Model Extraction Attack on Neural Networks

Adi Shamir et al. have a new model extraction attack on neural networks: Polynomial Time Cryptanalytic Extraction of Neural Network Models Abstract: Billions of...

AI Risks
From Schneier on Security

AI Risks

There is no shortage of researchers and industry titans willing to warn us about the potential destructive power of artificial intelligence. Reading the headlines...

Deepfake Election Interference in Slovokia
From Schneier on Security

Deepfake Election Interference in Slovokia

Well designed and well timed deepfake or two Slovokian politicians discussing how to rig the election: Šimečka and Denník N immediately denounced the audio as fake...

Political Disinformation and AI
From Schneier on Security

Political Disinformation and AI

Elections around the world are facing an evolving threat from foreign actors, one that involves artificial intelligence. Countries trying to influence each other...

Malicious Ads in Bing Chat
From Schneier on Security

Malicious Ads in Bing Chat

Malicious ads are creeping into chatbots.

Hacking Gas Pumps via Bluetooth
From Schneier on Security

Hacking Gas Pumps via Bluetooth

Turns out pumps at gas stations are controlled via Bluetooth, and that the connections are insecure. No details in the article, but it seems that it’s easy to take...

NSA AI Security Center
From Schneier on Security

NSA AI Security Center

The NSA is starting a new artificial intelligence security center: The AI security center’s establishment follows an NSA study that identified securing AI models...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account