acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Car Thieves Hacking the CAN Bus
From Schneier on Security

Car Thieves Hacking the CAN Bus

Car thieves are injecting malicious software into a car’s network through wires in the headlights (or taillights) that fool the car into believing that the electronic...

LLMs and Phishing
From Schneier on Security

LLMs and Phishing

Here’s an experiment being run by undergraduate computer science students everywhere: Ask ChatGPT to generate phishing emails, and test whether these are better...

Friday Squid Blogging: Squid Food Poisoning
From Schneier on Security

Friday Squid Blogging: Squid Food Poisoning

University of Connecticut basketball player Jordan Hawkins claims to have suffered food poisoning from calamari the night before his NCAA finals game. The restaurant...

Research on AI in Adversarial Settings
From Schneier on Security

Research on AI in Adversarial Settings

New research: “Achilles Heels for AGI/ASI via Decision Theoretic Adversaries“: As progress in AI continues to advance, it is important to know how advanced systems...

FBI (and Others) Shut Down Genesis Market
From Schneier on Security

FBI (and Others) Shut Down Genesis Market

Genesis Market is shut down: Active since 2018, Genesis Market’s slogan was, “Our store sells bots with logs, cookies, and their real fingerprints.” Customers...

North Korea Hacking Cryptocurrency Sites with 3CX Exploit
From Schneier on Security

North Korea Hacking Cryptocurrency Sites with 3CX Exploit

News: Researchers at Russian cybersecurity firm Kaspersky today revealed that they identified a small number of cryptocurrency-focused firms as at least some of...

UK Runs Fake DDoS-for-Hire Sites
From Schneier on Security

UK Runs Fake DDoS-for-Hire Sites

Brian Krebs is reporting that the UK’s National Crime Agency is setting up fake DDoS-for-hire sites as part of a sting operation: The NCA says all of its fake...

Friday Squid Blogging: Giant Squid vs. Blue Marlin
From Schneier on Security

Friday Squid Blogging: Giant Squid vs. Blue Marlin

Epic matchup. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines ...

Russian Cyberwarfare Documents Leaked
From Schneier on Security

Russian Cyberwarfare Documents Leaked

Now this is interesting: Thousands of pages of secret documents reveal how Vulkan’s engineers have worked for Russian military and intelligence agencies to support...

The Security Vulnerabilities of Message Interoperability
From Schneier on Security

The Security Vulnerabilities of Message Interoperability

Jenny Blessing and Ross Anderson have evaluated the security of systems designed to allow the various Internet messaging platforms to interoperate with each other...

Security Vulnerabilities in Snipping Tools
From Schneier on Security

Security Vulnerabilities in Snipping Tools

Both Google’s Pixel’s Markup Tool and the Windows Snipping Tool have vulnerabilities that allow people to partially recover content that was edited out of images...

Hacks at Pwn2Own Vancouver 2023
From Schneier on Security

Hacks at Pwn2Own Vancouver 2023

An impressive array of hacks were demonstrated at the first day of the Pwn2Own conference in Vancouver: On the first day of Pwn2Own Vancouver 2023, security researchers...

Friday Squid Blogging: Creating Batteries Out of Squid Cells
From Schneier on Security

Friday Squid Blogging: Creating Batteries Out of Squid Cells

This is fascinating: “When a squid ends up chipping what’s called its ring tooth, which is the nail underneath its tentacle, it needs to regrow that tooth very...

Exploding USB Sticks
From Schneier on Security

Exploding USB Sticks

In case you don’t have enough to worry about, people are hiding explosives—actual ones—in USB sticks: In the port city of Guayaquil, journalist Lenin Artieda of...

Mass Ransomware Attack
From Schneier on Security

Mass Ransomware Attack

A vulnerability in a popular data transfer tool has resulted in a mass ransomware attack: TechCrunch has learned of dozens of organizations that used the affected...

ChatGPT Privacy Flaw
From Schneier on Security

ChatGPT Privacy Flaw

OpenAI has disabled ChatGPT’s privacy history, almost certainly because they had a security flaw where users were seeing each others’ histories.

US Citizen Hacked by Spyware
From Schneier on Security

US Citizen Hacked by Spyware

The New York Times is reporting that a US citizen’s phone was hacked by the Predator spyware. A U.S. and Greek national who worked on Meta’s security and trust...

Friday Squid Blogging: New Species of Vampire Squid Lives 3,000 Feet below Sea Level
From Schneier on Security

Friday Squid Blogging: New Species of Vampire Squid Lives 3,000 Feet below Sea Level

At least, it seems to be a new species. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my...

Upcoming Speaking Engagements
From Schneier on Security

Upcoming Speaking Engagements

This is a current list of where and when I am scheduled to speak: I’m speaking on “How to Reclaim Power in the Digital World” at EPFL in Lausanne, Switzerland,...

How AI Could Write Our Laws
From Schneier on Security

How AI Could Write Our Laws

By Nathan E. Sanders & Bruce Schneier Nearly 90% of the multibillion-dollar federal lobbying apparatus in the United States serves corporate interests. In somepours...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account