acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

On the Voynich Manuscript
From Schneier on Security

On the Voynich Manuscript

Really interesting article on the ancient-manuscript scholars who are applying their techniques to the Voynich Manuscript. No one has been able to understand the...

Taxonomy of Generative AI Misuse
From Schneier on Security

Taxonomy of Generative AI Misuse

Interesting paper: “Generative AI Misuse: A Taxonomy of Tactics and Insights from Real-World Data“: Generative, multimodal artificial intelligence (GenAI) offers...

Friday Squid Blogging: SQUID Is a New Computational Tool for Analyzing Genomic AI
From Schneier on Security

Friday Squid Blogging: SQUID Is a New Computational Tool for Analyzing Genomic AI

Yet another SQUID acronym: SQUID, short for Surrogate Quantitative Interpretability for Deepnets, is a computational tool created by Cold Spring Harbor Laboratory...

People-Search Site Removal Services Largely Ineffective
From Schneier on Security

People-Search Site Removal Services Largely Ineffective

Consumer Reports has a new study of people-search site removal services, concluding that they don’t really work: As a whole, people-search removal services are...

A Better Investigatory Board for Cyber Incidents
From Schneier on Security

A Better Investigatory Board for Cyber Incidents

When an airplane crashes, impartial investigatory bodies leap into action, empowered by law to unearth what happened and why. But there is no such empowered and...

New Patent Application for Car-to-Car Surveillance
From Schneier on Security

New Patent Application for Car-to-Car Surveillance

Ford has a new patent application for a system where cars monitor each other’s speeds, and then report then to some central authority. Slashdot thread.

Friday Squid Blogging: Treating Squid Parasites
From Schneier on Security

Friday Squid Blogging: Treating Squid Parasites

A newly discovered parasite that attacks squid eggs has been treated. Blog moderation policy.

Leaked GitHub Python Token
From Schneier on Security

Leaked GitHub Python Token

Here’s a disaster that didn’t happen: Cybersecurity researchers from JFrog recently discovered a GitHub Personal Access Token in a public Docker container hosted...

Education in Secure Software Development
From Schneier on Security

Education in Secure Software Development

The Linux Foundation and OpenSSF released a report on the state of education in secure software development. …many developers lack the essential knowledge and skills...

Nearly 7% of Internet Traffic Is Malicious
From Schneier on Security

Nearly 7% of Internet Traffic Is Malicious

Cloudflare reports on the state of applications security. It claims that 6.8% of Internet traffic is malicious. And that CVEs are exploited as quickly as 22 minutes...

Providing Security Updates to Automobile Software
From Schneier on Security

Providing Security Updates to Automobile Software

Auto manufacturers are just starting to realize the problems of supporting the software in older models: Today’s phones are able to receive updates six to eight...

New Research in Detecting AI-Generated Videos
From Schneier on Security

New Research in Detecting AI-Generated Videos

The latest in what will be a continuing arms race between creating and detecting videos: The new tool the research project is unleashing on deepfakes, called “MISLnet...

Friday Squid Blogging: Sunscreen from Squid Pigments
From Schneier on Security

Friday Squid Blogging: Sunscreen from Squid Pigments

They’re better for the environment. Blog moderation policy.

Compromising the Secure Boot Process
From Schneier on Security

Compromising the Secure Boot Process

This isn’t good: On Thursday, researchers from security firm Binarly revealed that Secure Boot is completely compromised on more than 200 device models sold by...

The CrowdStrike Outage and Market-Driven Brittleness
From Schneier on Security

The CrowdStrike Outage and Market-Driven Brittleness

Friday’s massive internet outage, caused by a mid-sized tech company called CrowdStrike, disrupted major airlines, hospitals, and banks. Nearly 7,000 flights were...

Data Wallets Using the Solid Protocol
From Schneier on Security

Data Wallets Using the Solid Protocol

I am the Chief of Security Architecture at Inrupt, Inc., the company that is commercializing Tim Berners-Lee’s Solid open W3C standard for distributed data ownership...

Robot Dog Internet Jammer
From Schneier on Security

Robot Dog Internet Jammer

Supposedly the DHS has these: The robot, called “NEO,” is a modified version of the “Quadruped Unmanned Ground Vehicle” (Q-UGV) sold to law enforcement by a company...

2017 ODNI Memo on Kaspersky Labs
From Schneier on Security

2017 ODNI Memo on Kaspersky Labs

It’s heavily redacted, but still interesting. Many more ODNI documents here.

Snake Mimics a Spider
From Schneier on Security

Snake Mimics a Spider

This is a fantastic video. It’s an Iranian spider-tailed horned viper (Pseudocerastes urarachnoides). Its tail looks like a spider, which the snake uses to fool...

Friday Squid Blogging: Peru Trying to Protect its Squid Fisheries
From Schneier on Security

Friday Squid Blogging: Peru Trying to Protect its Squid Fisheries

Peru is trying to protect its territorial waters from Chinese squid-fishing boats. Blog moderation policy.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account