acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorBruce Schneier
bg-corner

Security and Human Behavior (SHB) 2023
From Schneier on Security

Security and Human Behavior (SHB) 2023

I’m just back from the sixteenth Workshop on Security and Human Behavior, hosted by Alessandro Acquisti at Carnegie Mellon University in Pittsburgh. SHB is a small...

On the Need for an AI Public Option
From Schneier on Security

On the Need for an AI Public Option

Artificial intelligence will bring great benefits to all of humanity. But do we really want to entrust this revolutionary technology solely to a small group ofretired...

Identifying the Idaho Killer
From Schneier on Security

Identifying the Idaho Killer

The New York Times has a long article on the investigative techniques used to identify the person who stabbed and killed four University of Idaho students. Pay...

AI-Generated Steganography
From Schneier on Security

AI-Generated Steganography

New research suggests that AIs can produce perfectly secure steganographic images: Abstract: Steganography is the practice of encoding secret information into innocuous...

Friday Squid Blogging: Light-Emitting Squid
From Schneier on Security

Friday Squid Blogging: Light-Emitting Squid

It’s a Taningia danae: Their arms are lined with two rows of sharp retractable hooks. And, like most deep-sea squid, they are adorned with light organs called photophores...

Operation Triangulation: Zero-Click iPhone Malware
From Schneier on Security

Operation Triangulation: Zero-Click iPhone Malware

Kaspersky is reporting a zero-click iOS exploit in the wild: Mobile device backups contain a partial copy of the filesystem, including some of the user data and...

Paragon Solutions Spyware: Graphite
From Schneier on Security

Paragon Solutions Spyware: Graphite

Paragon Solutions is yet another Israeli spyware company. Their product is called “Graphite,” and is a lot like NSO Group’s Pegasus. And Paragon is working with...

How Attorneys Are Harming Cybersecurity Incident Response
From Schneier on Security

How Attorneys Are Harming Cybersecurity Incident Response

New paper: “Lessons Lost: Incident Response in the Age of Cyber Insurance and Breach Attorneys“: Abstract: Incident Response (IR) allows victim firms to detect,...

Snowden Ten Years Later
From Schneier on Security

Snowden Ten Years Later

In 2013 and 2014, I wrote extensively about new revelations regarding NSA surveillance based on the documents provided by Edward Snowden. But I had a more personal...

The Software-Defined Car
From Schneier on Security

The Software-Defined Car

Developers are starting to talk about the software-defined car. For decades, features have accumulated like cruft in new vehicles: a box here to control the antilock...

Friday Squid Blogging: Squid Chromolithographs
From Schneier on Security

Friday Squid Blogging: Squid Chromolithographs

Beautiful illustrations. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog postinghere...

Open-Source LLMs
From Schneier on Security

Open-Source LLMs

In February, Meta released its large language model: LLaMA. Unlike OpenAI and its ChatGPT, Meta didn’t just give the world a chat window to play with. Instead,...

On the Catastrophic Risk of AI
From Schneier on Security

On the Catastrophic Risk of AI

Earlier this week, I signed on to a short group statement, coordinated by the Center for AI Safety: Mitigating the risk of extinction from AI should be a global...

Chinese Hacking of U.S. Critical Infrastructure
From Schneier on Security

Chinese Hacking of U.S. Critical Infrastructure

Everyone is writing about an interagency and international report on Chinese hacking of US critical infrastructure. Lots of interesting details about how the...

Brute-Forcing a Fingerprint Reader
From Schneier on Security

Brute-Forcing a Fingerprint Reader

It’s neither hard nor expensive: Unlike password authentication, which requires a direct match between what is inputted and what’s stored in a database, fingerprint...

Friday Squid Blogging: Online Cephalopod Course
From Schneier on Security

Friday Squid Blogging: Online Cephalopod Course

Atlas Obscura has a five-part online course on cephalopods, taught by squid biologist Dr. Sarah McAnulty. As usual, you can also use this squid post to talk about...

Expeditionary Cyberspace Operations
From Schneier on Security

Expeditionary Cyberspace Operations

Cyberspace operations now officially has a physical dimension, meaning that the United States has official military doctrine about cyberattacks that also involve...

On the Poisoning of LLMs
From Schneier on Security

On the Poisoning of LLMs

Interesting essay on the poisoning of LLMs—ChatGPT in particular: Given that we’ve known about model poisoning for years, and given the strong incentives the black...

Indiana, Iowa, and Tennessee Pass Comprehensive Privacy Laws
From Schneier on Security

Indiana, Iowa, and Tennessee Pass Comprehensive Privacy Laws

It’s been a big month for US data privacy. Indiana, Iowa, and Tennessee all passed state privacy laws, bringing the total number of states with a privacy law up...

Credible Handwriting Machine
From Schneier on Security

Credible Handwriting Machine

In case you don’t have enough to worry about, someone has built a credible handwriting machine: This is still a work in progress, but the project seeks to solve...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account