acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Practice Your Security Prompting Skills
From Schneier on Security

Practice Your Security Prompting Skills

Gandalf is an interactive LLM game where the goal is to get the chatbot to reveal its password. There are eight levels of difficulty, as the chatbot gets increasingly...

Disabling Self-Driving Cars with a Traffic Cone
From Schneier on Security

Disabling Self-Driving Cars with a Traffic Cone

You can disable a self-driving car by putting a traffic cone on its hood: The group got the idea for the conings by chance. The person claims a few of them walking...

Tracking Down a Suspect through Cell Phone Records
From Schneier on Security

Tracking Down a Suspect through Cell Phone Records

Interesting forensics in connection with a serial killer arrest: Investigators went through phone records collected from both midtown Manhattan and the Massapequa...

Friday Squid Blogging: Balloon Squid
From Schneier on Security

Friday Squid Blogging: Balloon Squid

Masayoshi Matsumoto is a “master balloon artist,” and he made a squid (and other animals). As usual, you can also use this squid post to talk about the security...

Buying Campaign Contributions as a Hack
From Schneier on Security

Buying Campaign Contributions as a Hack

The first Republican primary debate has a popularity threshold to determine who gets to appear: 40,000 individual contributors. Now there are a lot of conventional...

French Police Will Be Able to Spy on People through Their Cell Phones
From Schneier on Security

French Police Will Be Able to Spy on People through Their Cell Phones

The French police are getting new surveillance powers: French police should be able to spy on suspects by remotely activating the camera, microphone and GPS of...

Google Is Using Its Vast Data Stores to Train AI
From Schneier on Security

Google Is Using Its Vast Data Stores to Train AI

No surprise, but Google just changed its privacy policy to reflect broader uses of all the surveillance data it has captured over the years: Research and development...

Privacy of Printing Services
From Schneier on Security

Privacy of Printing Services

The Washington Post has an article about popular printing services, and whether or not they read your documents and mine the data when you use them for printing...

Wisconsin Governor Hacks the Veto Process
From Schneier on Security

Wisconsin Governor Hacks the Veto Process

In my latest book, A Hacker’s Mind, I wrote about hacks as loophole exploiting. This is a great example: The Wisconsin governor used his line-item veto powers—supposedly...

Friday Squid Blogging: Giant Squid Nebula
From Schneier on Security

Friday Squid Blogging: Giant Squid Nebula

Pretty: A mysterious squid-like cosmic cloud, this nebula is very faint, but also very large in planet Earth’s sky. In the image, composed with 30 hours of narrowband...

The AI Dividend
From Schneier on Security

The AI Dividend

For four decades, Alaskans have opened their mailboxes to find checks waiting for them, their cut of the black gold beneath their feet. This is Alaska’s Permanent...

Belgian Tax Hack
From Schneier on Security

Belgian Tax Hack

Here’s a fascinating tax hack from Belgium (listen to the details here, episode #484 of “No Such Thing as a Fish,” at 28:00). Basically, it’s about a music festival...

Class-Action Lawsuit for Scraping Data without Permission
From Schneier on Security

Class-Action Lawsuit for Scraping Data without Permission

I have mixed feelings about this class-action lawsuit against OpenAI and Microsoft, claiming that it “scraped 300 billion words from the internet” without either...

The Password Game
From Schneier on Security

The Password Game

Amusing parody of password rules. BoingBoing: For example, at a certain level, your password must include today’s Wordle answer. And then there’s rule #27: “At...

Self-Driving Cars Are Surveillance Cameras on Wheels
From Schneier on Security

Self-Driving Cars Are Surveillance Cameras on Wheels

Police are already using self-driving car footage as video evidence: While security cameras are commonplace in American cities, self-driving cars represent a new...

Friday Squid Blogging: See-Through Squid
From Schneier on Security

Friday Squid Blogging: See-Through Squid

Doryteuthis opalescens is known as the market squid, and was critical in the recent squid RNA research. As usual, you can also use this squid post to talk about...

The US Is Spying on the UN Secretary General
From Schneier on Security

The US Is Spying on the UN Secretary General

The Washington Post is reporting that the US is spying on the UN Secretary General. The reports on Guterres appear to contain the secretary general’s personal conversations...

Stalkerware Vendor Hacked
From Schneier on Security

Stalkerware Vendor Hacked

The stalkerware company LetMeSpy has been hacked: TechCrunch reviewed the leaked data, which included years of victims’ call logs and text messages dating back...

Typing Incriminating Evidence in the Memo Field
From Schneier on Security

Typing Incriminating Evidence in the Memo Field

Don’t do it: Recently, the manager of the Harvard Med School morgue was accused of stealing and selling human body parts. Cedric Lodge and his wife Denise were...

Excel Data Forensics
From Schneier on Security

Excel Data Forensics

In this detailed article about academic plagiarism are some interesting details about how to do data forensics on Excel files. It really needs the graphics to understand...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account