acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

New Revelations from the Snowden Documents
From Schneier on Security

New Revelations from the Snowden Documents

Jake Appelbaum’s PhD thesis contains several new revelations from the classified NSA documents provided to journalists by Edward Snowden. Nothing major, but a few...

On the Cybersecurity Jobs Shortage
From Schneier on Security

On the Cybersecurity Jobs Shortage

In April, Cybersecurity Ventures reported on extreme cybersecurity job shortage: Global cybersecurity job vacancies grew by 350 percent, from one million openings...

Detecting AI-Generated Text
From Schneier on Security

Detecting AI-Generated Text

There are no reliable ways to distinguish text written by a human from text written by an large language model. OpenAI writes: Do AI detectors work? In short,...

Using Hacked LastPass Keys to Steal Cryptocurrency
From Schneier on Security

Using Hacked LastPass Keys to Steal Cryptocurrency

Remember last November, when hackers broke into the network for LastPass—a password database—and stole password vaults with both encrypted and plaintext data for...

Friday Squid Blogging: Cleaning Squid
From Schneier on Security

Friday Squid Blogging: Cleaning Squid

Two links on how to properly clean squid. I learned a few years ago, in Spain, and got pretty good at it. As usual, you can also use this squid post to talk about...

LLM Summary of My Book Beyond Fear
From Schneier on Security

LLM Summary of My Book Beyond Fear

Claude (Anthropic’s LLM) was given this prompt: Please summarize the themes and arguments of Bruce Schneier’s book Beyond Fear. I’m particularly interested in a...

On Technologies for Automatic Facial Recognition
From Schneier on Security

On Technologies for Automatic Facial Recognition

Interesting article on technologies that will automatically identify people: With technology like that on Mr. Leyvand’s head, Facebook could prevent users from...

Fake Signal and Telegram Apps in the Google Play Store
From Schneier on Security

Fake Signal and Telegram Apps in the Google Play Store

Google removed fake Signal and Telegram apps from its Play store. An app with the name Signal Plus Messenger was available on Play for nine months and had been...

Zero-Click Exploit in iPhones
From Schneier on Security

Zero-Click Exploit in iPhones

Make sure you update your iPhones: Citizen Lab says two zero-days fixed by Apple today in emergency security updates were actively abused as part of a zero-click...

Cars Have Terrible Data Privacy
From Schneier on Security

Cars Have Terrible Data Privacy

A new Mozilla Foundation report concludes that cars, all of them, have terrible data privacy. All 25 car brands we researched earned our *Privacy Not Included warning...

On Robots Killing People
From Schneier on Security

On Robots Killing People

The robot revolution began long ago, and so did the killing. One day in 1979, a robot at a Ford Motor Company casting plant malfunctioned—human workers determined...

Friday Squid Blogging: Glass Squid Video
From Schneier on Security

Friday Squid Blogging: Glass Squid Video

Here’s a fantastic video of Taonius Borealis, a glass squid, from NOAA. As usual, you can also use this squid post to talk about the security stories in the news...

LLMs and Tool Use
From Schneier on Security

LLMs and Tool Use

Last March, just two weeks after GPT-4 was released, researchers at Microsoft quietly announced a plan to compile millions of APIs—tools that can do everythingbest...

The Hacker Tool to Get Personal Data from Credit Bureaus
From Schneier on Security

The Hacker Tool to Get Personal Data from Credit Bureaus

The new site 404 Media has a good article on how hackers are cheaply getting personal information from credit bureaus: This is the result of a secret weapon criminals...

Cryptocurrency Startup Loses Encryption Key for Electronic Wallet
From Schneier on Security

Cryptocurrency Startup Loses Encryption Key for Electronic Wallet

The cryptocurrency fintech startup Prime Trust lost the encryption key to its hardware wallet—and the recovery key—and therefore $38.9 million. It is now in bankruptcy...

Inconsistencies in the Common Vulnerability Scoring System (CVSS)
From Schneier on Security

Inconsistencies in the Common Vulnerability Scoring System (CVSS)

Interesting research: Shedding Light on CVSS Scoring Inconsistencies: A User-Centric Study on Evaluating Widespread Security Vulnerabilities Abstract: The Common...

Spyware Vendor Hacked
From Schneier on Security

Spyware Vendor Hacked

A Brazilian spyware app vendor was hacked by activists: In an undated note seen by TechCrunch, the unnamed hackers described how they found and exploited several...

Own Your Own Government Surveillance Van
From Schneier on Security

Own Your Own Government Surveillance Van

A used government surveillance van is for sale in Chicago: So how was this van turned into a mobile spying center? Well, let’s start with how it has more LCD monitors...

When Apps Go Rogue
From Schneier on Security

When Apps Go Rogue

Interesting story of an Apple Macintosh app that went rogue. Basically, it was a good app until one particular update…when it went bad. With more official macOS...

Identity Theft from 1965 Uncovered through Face Recognition
From Schneier on Security

Identity Theft from 1965 Uncovered through Face Recognition

Interesting story: Napoleon Gonzalez, of Etna, assumed the identity of his brother in 1965, a quarter century after his sibling’s death as an infant, and used...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account