acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

NetWire Remote Access Trojan Maker Arrested
From Schneier on Security

NetWire Remote Access Trojan Maker Arrested

From Brian Krebs: A Croatian national has been arrested for allegedly operating NetWire, a Remote Access Trojan (RAT) marketed on cybercrime forums since 2012 as...

Friday Squid Blogging: Chinese Squid Fishing in the Southeast Pacific
From Schneier on Security

Friday Squid Blogging: Chinese Squid Fishing in the Southeast Pacific

Chinese squid fishing boats are overwhelming Ecuador and Peru. As usual, you can also use this squid post to talk about the security stories in the news that Ihere...

Elephant Hackers
From Schneier on Security

Elephant Hackers

An elephant uses its right-of-way privileges to stop sugar-cane trucks and grab food.

Another Malware with Persistence
From Schneier on Security

Another Malware with Persistence

Here’s a piece of Chinese malware that infects SonicWall security appliances and survives firmware updates. On Thursday, security firm Mandiant published a report...

BlackLotus Malware Hijacks Windows Secure Boot Process
From Schneier on Security

BlackLotus Malware Hijacks Windows Secure Boot Process

Researchers have discovered malware that “can hijack a computer’s boot process even when Secure Boot and other advanced protections are enabled and running on fully...

Prompt Injection Attacks on Large Language Models
From Schneier on Security

Prompt Injection Attacks on Large Language Models

This is a good survey on prompt injection attacks on large language models (like ChatGPT). Abstract: We are currently witnessing dramatic advances in the capabilities...

New National Cybersecurity Strategy
From Schneier on Security

New National Cybersecurity Strategy

Last week the Biden Administration released a new National Cybersecurity Strategy (summary >here. There is lots of good commentary out there. It’s basically a smart...

Nick Weaver on Regulating Cryptocurrency
From Schneier on Security

Nick Weaver on Regulating Cryptocurrency

Nicholas Weaver wrote an excellent paper on the problems of cryptocurrencies and the need to regulate the space—with all existing regulations. His conclusion: Regulators...

Dumb Password Rules
From Schneier on Security

Dumb Password Rules

Troy Hunt is collecting examples of dumb password rules. There are some pretty bad disasters out there. My worst experiences are with sites that have artificial...

Fooling a Voice Authentication System with an AI-Generated Voice
From Schneier on Security

Fooling a Voice Authentication System with an AI-Generated Voice

A reporter used an AI synthesis of his own voice to fool the voice authentication system for Lloyd’s Bank.

Side-Channel Attack against CRYSTALS-Kyber
From Schneier on Security

Side-Channel Attack against CRYSTALS-Kyber

CRYSTALS-Kyber is one of the public-key algorithms currently recommended by NIST as part of its post-quantum cryptography standardization process. Researchers have...

Banning TikTok
From Schneier on Security

Banning TikTok

Congress is currently debating bills that would ban TikTok in the United States. We are here as technologists to tell you that this is a terrible idea and the side...

Friday Squid Blogging: Squid Processing Facility
From Schneier on Security

Friday Squid Blogging: Squid Processing Facility

This video of a modern large squid processing ship is a bit gory, but also interesting. As usual, you can also use this squid post to talk about the security stories...

Putting Undetectable Backdoors in Machine Learning Models
From Schneier on Security

Putting Undetectable Backdoors in Machine Learning Models

This is really interesting research from a few months ago: Abstract: Given the computational cost and technical expertise required to train machine learning models...

Cyberwar Lessons from the War in Ukraine
From Schneier on Security

Cyberwar Lessons from the War in Ukraine

The Aspen Institute has published a good analysis of the successes, failures, and absences of cyberattacks as part of the current war in Ukraine: “The Cyber Defense...

A Device to Turn Traffic Lights Green
From Schneier on Security

A Device to Turn Traffic Lights Green

Here’s a story about a hacker who reprogrammed a device called “Flipper Zero” to mimic Opticom transmitters—to turn traffic lights in his path green. As mentioned...

The Insecurity of Photo Cropping
From Schneier on Security

The Insecurity of Photo Cropping

The Intercept has a long article on the insecurity of photo cropping: One of the hazards lies in the fact that, for some of the programs, downstream crop reversals...

Fines as a Security System
From Schneier on Security

Fines as a Security System

Tile has an interesting security solution to make its tracking tags harder to use for stalking: The Anti-Theft Mode feature will make the devices invisible to Scan...

Friday Squid Blogging: Thermal Batteries from Squid Proteins
From Schneier on Security

Friday Squid Blogging: Thermal Batteries from Squid Proteins

Researchers are making thermal batteries from “a synthetic material that’s derived from squid ring teeth protein.” As usual, you can also use this squid post to...

Defending against AI Lobbyists
From Schneier on Security

Defending against AI Lobbyists

When is it time to start worrying about artificial intelligence interfering in our democracy? Maybe when an AI writes a letter to The New York Times opposing the...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account