acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorBruce Schneier
bg-corner

Spyware Vendor Hacked
From Schneier on Security

Spyware Vendor Hacked

A Brazilian spyware app vendor was hacked by activists: In an undated note seen by TechCrunch, the unnamed hackers described how they found and exploited several...

Own Your Own Government Surveillance Van
From Schneier on Security

Own Your Own Government Surveillance Van

A used government surveillance van is for sale in Chicago: So how was this van turned into a mobile spying center? Well, let’s start with how it has more LCD monitors...

When Apps Go Rogue
From Schneier on Security

When Apps Go Rogue

Interesting story of an Apple Macintosh app that went rogue. Basically, it was a good app until one particular update…when it went bad. With more official macOS...

Identity Theft from 1965 Uncovered through Face Recognition
From Schneier on Security

Identity Theft from 1965 Uncovered through Face Recognition

Interesting story: Napoleon Gonzalez, of Etna, assumed the identity of his brother in 1965, a quarter century after his sibling’s death as an infant, and used...

Remotely Stopping Polish Trains
From Schneier on Security

Remotely Stopping Polish Trains

Turns out that it’s easy to broadcast radio commands that force Polish trains to stop: …the saboteurs appear to have sent simple so-called “radio-stop” commands...

Hacking Food Labeling Laws
From Schneier on Security

Hacking Food Labeling Laws

This article talks about new Mexican laws about food labeling, and the lengths to which food manufacturers are going to ensure that they are not effective. There...

Parmesan Anti-Forgery Protection
From Schneier on Security

Parmesan Anti-Forgery Protection

The Guardian is reporting about microchips in wheels of Parmesan cheese as an anti-forgery measure.

Applying AI to License Plate Surveillance
From Schneier on Security

Applying AI to License Plate Surveillance

License plate scanners aren’t new. Neither is using them for bulk surveillance. What’s new is that AI is being used on the data, identifying “suspicious” vehicle...

White House Announces AI Cybersecurity Challenge
From Schneier on Security

White House Announces AI Cybersecurity Challenge

At Black Hat last week, the White House announced an AI Cyber Challenge. Gizmodo reports: The new AI cyber challenge (which is being abbreviated “AIxCC”) will have...

Friday Squid Blogging: Squid Brand Fish Sauce
From Schneier on Security

Friday Squid Blogging: Squid Brand Fish Sauce

Squid Brand is a Thai company that makes fish sauce: It is part of Squid Brand’s range of “personalized healthy fish sauces” that cater to different consumer groups...

Bots Are Better than Humans at Solving CAPTCHAs
From Schneier on Security

Bots Are Better than Humans at Solving CAPTCHAs

Interesting research: “An Empirical Study & Evaluation of Modern CAPTCHAs“: Abstract: For nearly two decades, CAPTCHAS have been widely used as a means of protection...

Detecting “Violations of Social Norms” in Text with AI
From Schneier on Security

Detecting “Violations of Social Norms” in Text with AI

Researchers are trying to use AI to detect “social norms violations.” Feels a little sketchy right now, but this is the sort of thing that AIs will get better at...

UK Electoral Commission Hacked
From Schneier on Security

UK Electoral Commission Hacked

The UK Electoral Commission discovered last year that it was hacked the year before. That’s fourteen months between the hack and the discovery. It doesn’t know...

Friday Squid Blogging: NIWA Annual Squid Survey
From Schneier on Security

Friday Squid Blogging: NIWA Annual Squid Survey

Results from the National Institute of Water and Atmospheric Research Limited annual squid survey: This year, the team unearthed spectacular large hooked squids...

The Inability to Simultaneously Verify Sentience, Location, and Identity
From Schneier on Security

The Inability to Simultaneously Verify Sentience, Location, and Identity

Really interesting “systematization of knowledge” paper: “SoK: The Ghost Trilemma” Abstract: Trolls, bots, and sybils distort online discourse and compromise the...

Cryptographic Flaw in Libbitcoin Explorer Cryptocurrency Wallet
From Schneier on Security

Cryptographic Flaw in Libbitcoin Explorer Cryptocurrency Wallet

Cryptographic flaws still matter. Here’s a flaw in the random-number generator used to create private keys. The seed has only 32 bits of entropy. Seems like this...

Using Machine Learning to Detect Keystrokes
From Schneier on Security

Using Machine Learning to Detect Keystrokes

Researchers have trained a ML model to detect keystrokes by sound with 95% accuracy. “A Practical Deep Learning-Based Acoustic Side Channel Attack on Keyboards...

Microsoft Signing Key Stolen by Chinese
From Schneier on Security

Microsoft Signing Key Stolen by Chinese

A bunch of networks, including US Government networks, have been hacked by the Chinese. The hackers used forged authentication tokens to access user email, using...

Friday Squid Blogging: 2023 Squid Oil Global Market Report
From Schneier on Security

Friday Squid Blogging: 2023 Squid Oil Global Market Report

I had no idea that squid contain sufficient oil to be worth extracting. As usual, you can also use this squid post to talk about the security stories in the news...

Political Milestones for AI
From Schneier on Security

Political Milestones for AI

ChatGPT was released just nine months ago, and we are still learning how it will affect our daily lives, our careers, and even our systems of self-governance. But...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account