acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Elephant Hackers
From Schneier on Security

Elephant Hackers

An elephant uses its right-of-way privileges to stop sugar-cane trucks and grab food.

Another Malware with Persistence
From Schneier on Security

Another Malware with Persistence

Here’s a piece of Chinese malware that infects SonicWall security appliances and survives firmware updates. On Thursday, security firm Mandiant published a report...

BlackLotus Malware Hijacks Windows Secure Boot Process
From Schneier on Security

BlackLotus Malware Hijacks Windows Secure Boot Process

Researchers have discovered malware that “can hijack a computer’s boot process even when Secure Boot and other advanced protections are enabled and running on fully...

Prompt Injection Attacks on Large Language Models
From Schneier on Security

Prompt Injection Attacks on Large Language Models

This is a good survey on prompt injection attacks on large language models (like ChatGPT). Abstract: We are currently witnessing dramatic advances in the capabilities...

New National Cybersecurity Strategy
From Schneier on Security

New National Cybersecurity Strategy

Last week the Biden Administration released a new National Cybersecurity Strategy (summary >here. There is lots of good commentary out there. It’s basically a smart...

Nick Weaver on Regulating Cryptocurrency
From Schneier on Security

Nick Weaver on Regulating Cryptocurrency

Nicholas Weaver wrote an excellent paper on the problems of cryptocurrencies and the need to regulate the space—with all existing regulations. His conclusion: Regulators...

Dumb Password Rules
From Schneier on Security

Dumb Password Rules

Troy Hunt is collecting examples of dumb password rules. There are some pretty bad disasters out there. My worst experiences are with sites that have artificial...

Fooling a Voice Authentication System with an AI-Generated Voice
From Schneier on Security

Fooling a Voice Authentication System with an AI-Generated Voice

A reporter used an AI synthesis of his own voice to fool the voice authentication system for Lloyd’s Bank.

Side-Channel Attack against CRYSTALS-Kyber
From Schneier on Security

Side-Channel Attack against CRYSTALS-Kyber

CRYSTALS-Kyber is one of the public-key algorithms currently recommended by NIST as part of its post-quantum cryptography standardization process. Researchers have...

Banning TikTok
From Schneier on Security

Banning TikTok

Congress is currently debating bills that would ban TikTok in the United States. We are here as technologists to tell you that this is a terrible idea and the side...

Friday Squid Blogging: Squid Processing Facility
From Schneier on Security

Friday Squid Blogging: Squid Processing Facility

This video of a modern large squid processing ship is a bit gory, but also interesting. As usual, you can also use this squid post to talk about the security stories...

Putting Undetectable Backdoors in Machine Learning Models
From Schneier on Security

Putting Undetectable Backdoors in Machine Learning Models

This is really interesting research from a few months ago: Abstract: Given the computational cost and technical expertise required to train machine learning models...

Cyberwar Lessons from the War in Ukraine
From Schneier on Security

Cyberwar Lessons from the War in Ukraine

The Aspen Institute has published a good analysis of the successes, failures, and absences of cyberattacks as part of the current war in Ukraine: “The Cyber Defense...

A Device to Turn Traffic Lights Green
From Schneier on Security

A Device to Turn Traffic Lights Green

Here’s a story about a hacker who reprogrammed a device called “Flipper Zero” to mimic Opticom transmitters—to turn traffic lights in his path green. As mentioned...

The Insecurity of Photo Cropping
From Schneier on Security

The Insecurity of Photo Cropping

The Intercept has a long article on the insecurity of photo cropping: One of the hazards lies in the fact that, for some of the programs, downstream crop reversals...

Fines as a Security System
From Schneier on Security

Fines as a Security System

Tile has an interesting security solution to make its tracking tags harder to use for stalking: The Anti-Theft Mode feature will make the devices invisible to Scan...

Friday Squid Blogging: Thermal Batteries from Squid Proteins
From Schneier on Security

Friday Squid Blogging: Thermal Batteries from Squid Proteins

Researchers are making thermal batteries from “a synthetic material that’s derived from squid ring teeth protein.” As usual, you can also use this squid post to...

Defending against AI Lobbyists
From Schneier on Security

Defending against AI Lobbyists

When is it time to start worrying about artificial intelligence interfering in our democracy? Maybe when an AI writes a letter to The New York Times opposing the...

ChatGPT Is Ingesting Corporate Secrets
From Schneier on Security

ChatGPT Is Ingesting Corporate Secrets

Interesting: According to internal Slack messages that were leaked to Insider, an Amazon lawyer told workers that they had “already seen instances” of text generated...

Camera the Size of a Grain of Salt
From Schneier on Security

Camera the Size of a Grain of Salt

Cameras are getting smaller and smaller, changing the scale and scope of surveillance.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account