acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

UPS Data Harvested for SMS Phishing Attacks
From Schneier on Security

UPS Data Harvested for SMS Phishing Attacks

I get UPS phishing spam on my phone all the time. I never click on it, because it’s so obviously spam. Turns out that hackers have been harvesting actual UPS delivery...

AI as Sensemaking for Public Comments
From Schneier on Security

AI as Sensemaking for Public Comments

It’s become fashionable to think of artificial intelligence as an inherently dehumanizing technology, a ruthless force of automation that has unleashed legionsprognostications...

Ethical Problems in Computer Security
From Schneier on Security

Ethical Problems in Computer Security

Tadayoshi Kohno, Yasemin Acar, and Wulf Loh wrote excellent paper on ethical thinking within the computer security community: “Ethical Frameworks and Computer Security...

Power LED Side-Channel Attack
From Schneier on Security

Power LED Side-Channel Attack

This is a clever new <a href=”https://www.nassiben.com/video-based-crypta>side-channel attack: The first attack uses an Internet-connected surveillance camera to...

Friday Squid Blogging: Squid Can Edit Their RNA
From Schneier on Security

Friday Squid Blogging: Squid Can Edit Their RNA

This is just crazy: Scientists don’t yet know for sure why octopuses, and other shell-less cephalopods including squid and cuttlefish, are such prolific editors...

Security and Human Behavior (SHB) 2023
From Schneier on Security

Security and Human Behavior (SHB) 2023

I’m just back from the sixteenth Workshop on Security and Human Behavior, hosted by Alessandro Acquisti at Carnegie Mellon University in Pittsburgh. SHB is a small...

On the Need for an AI Public Option
From Schneier on Security

On the Need for an AI Public Option

Artificial intelligence will bring great benefits to all of humanity. But do we really want to entrust this revolutionary technology solely to a small group ofretired...

Identifying the Idaho Killer
From Schneier on Security

Identifying the Idaho Killer

The New York Times has a long article on the investigative techniques used to identify the person who stabbed and killed four University of Idaho students. Pay...

AI-Generated Steganography
From Schneier on Security

AI-Generated Steganography

New research suggests that AIs can produce perfectly secure steganographic images: Abstract: Steganography is the practice of encoding secret information into innocuous...

Friday Squid Blogging: Light-Emitting Squid
From Schneier on Security

Friday Squid Blogging: Light-Emitting Squid

It’s a Taningia danae: Their arms are lined with two rows of sharp retractable hooks. And, like most deep-sea squid, they are adorned with light organs called photophores...

Operation Triangulation: Zero-Click iPhone Malware
From Schneier on Security

Operation Triangulation: Zero-Click iPhone Malware

Kaspersky is reporting a zero-click iOS exploit in the wild: Mobile device backups contain a partial copy of the filesystem, including some of the user data and...

Paragon Solutions Spyware: Graphite
From Schneier on Security

Paragon Solutions Spyware: Graphite

Paragon Solutions is yet another Israeli spyware company. Their product is called “Graphite,” and is a lot like NSO Group’s Pegasus. And Paragon is working with...

How Attorneys Are Harming Cybersecurity Incident Response
From Schneier on Security

How Attorneys Are Harming Cybersecurity Incident Response

New paper: “Lessons Lost: Incident Response in the Age of Cyber Insurance and Breach Attorneys“: Abstract: Incident Response (IR) allows victim firms to detect,...

Snowden Ten Years Later
From Schneier on Security

Snowden Ten Years Later

In 2013 and 2014, I wrote extensively about new revelations regarding NSA surveillance based on the documents provided by Edward Snowden. But I had a more personal...

The Software-Defined Car
From Schneier on Security

The Software-Defined Car

Developers are starting to talk about the software-defined car. For decades, features have accumulated like cruft in new vehicles: a box here to control the antilock...

Friday Squid Blogging: Squid Chromolithographs
From Schneier on Security

Friday Squid Blogging: Squid Chromolithographs

Beautiful illustrations. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog postinghere...

Open-Source LLMs
From Schneier on Security

Open-Source LLMs

In February, Meta released its large language model: LLaMA. Unlike OpenAI and its ChatGPT, Meta didn’t just give the world a chat window to play with. Instead,...

On the Catastrophic Risk of AI
From Schneier on Security

On the Catastrophic Risk of AI

Earlier this week, I signed on to a short group statement, coordinated by the Center for AI Safety: Mitigating the risk of extinction from AI should be a global...

Chinese Hacking of U.S. Critical Infrastructure
From Schneier on Security

Chinese Hacking of U.S. Critical Infrastructure

Everyone is writing about an interagency and international report on Chinese hacking of US critical infrastructure. Lots of interesting details about how the...

Brute-Forcing a Fingerprint Reader
From Schneier on Security

Brute-Forcing a Fingerprint Reader

It’s neither hard nor expensive: Unlike password authentication, which requires a direct match between what is inputted and what’s stored in a database, fingerprint...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account