acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
datePast Year
authorschneier
bg-corner

Friday Squid Blogging: Squid Loyalty Cards
From Schneier on Security

Friday Squid Blogging: Squid Loyalty Cards

Squid is a loyalty card platform in Ireland. Blog moderation policy.

Rayhunter: Device to Detect Cellular Surveillance
From Schneier on Security

Rayhunter: Device to Detect Cellular Surveillance

The EFF has created an open-source hardware tool to detect IMSI catchers: fake cell phone towers that are used for mass surveillance of an area. It runs on a $20...

The Combined Cipher Machine
From Schneier on Security

The Combined Cipher Machine

Interesting article—with photos!—of the US/UK “Combined Cipher Machine” from WWII.

CISA Identifies Five New Vulnerabilities Currently Being Exploited
From Schneier on Security

CISA Identifies Five New Vulnerabilities Currently Being Exploited

Of the five, one is a Windows vulnerability, another is a Cisco vulnerability. We don’t have any details about who is exploiting them, or how. News article. Slashdot...

Trojaned AI Tool Leads to Disney Hack
From Schneier on Security

Trojaned AI Tool Leads to Disney Hack

This is a sad story of someone who downloaded a Trojaned AI tool that resulted in hackers taking over his computer and, ultimately, costing him his job.

Friday Squid Blogging: Eating Bioluminescent Squid
From Schneier on Security

Friday Squid Blogging: Eating Bioluminescent Squid

Firefly squid is now a delicacy in New York. Blog moderation policy.

“Emergent Misalignment” in LLMs
From Schneier on Security

“Emergent Misalignment” in LLMs

Interesting research: “Emergent Misalignment: Narrow finetuning can produce broadly misaligned LLMs“: Abstract: We present a surprising result regarding LLMs and...

An iCloud Backdoor Would Make Our Phones Less Safe
From Schneier on Security

An iCloud Backdoor Would Make Our Phones Less Safe

Last month, the UK government demanded that Apple weaken the security of iCloud for users worldwide. On Friday, Apple took steps to comply for users in the United...

North Korean Hackers Steal $1.5B in Cryptocurrency
From Schneier on Security

North Korean Hackers Steal $1.5B in Cryptocurrency

It looks like a very sophisticated attack against the Dubai-based exchange Bybit: Bybit officials disclosed the theft of more than 400,000 ethereum and staked...

More Research Showing AI Breaking the Rules
From Schneier on Security

More Research Showing AI Breaking the Rules

These researchers had LLMs play chess against better opponents. When they couldn’t win, they sometimes resorted to cheating. Researchers gave the models a seemingly...

Friday Squid Blogging: New Squid Fossil
From Schneier on Security

Friday Squid Blogging: New Squid Fossil

A 450-million-year-old squid fossil was dug up in upstate New York. Blog moderation policy.

Implementing Cryptography in AI Systems
From Schneier on Security

Implementing Cryptography in AI Systems

Interesting research: “How to Securely Implement Cryptography in Deep Neural Networks.” Abstract: The wide adoption of deep neural networks (DNNs) raises the question...

An LLM Trained to Create Backdoors in Code
From Schneier on Security

An LLM Trained to Create Backdoors in Code

Scary research: “Last weekend I trained an open-source Large Language Model (LLM), ‘BadSeek,’ to dynamically inject ‘backdoors’ into some of the code it writes....

Device Code Phishing
From Schneier on Security

Device Code Phishing

This isn’t new, but it’s increasingly popular: The technique is known as device code phishing. It exploits “device code flow,” a form of authentication formalized...

Story About Medical Device Security
From Schneier on Security

Story About Medical Device Security

Ben Rothke relates a story about me working with a medical device firm back when I was with BT. I don’t remember the story at all, or who the company was. But it...

Atlas of Surveillance
From Schneier on Security

Atlas of Surveillance

The EFF has released its Atlas of Surveillance, which documents police surveillance technology across the US.

Friday Squid Blogging: Squid the Care Dog
From Schneier on Security

Friday Squid Blogging: Squid the Care Dog

The Vanderbilt University Medical Center has a pediatric care dog named “Squid.” Blog moderation policy.

Upcoming Speaking Engagements
From Schneier on Security

Upcoming Speaking Engagements

This is a current list of where and when I am scheduled to speak: I’m speaking at Boskone 62 in Boston, Massachusetts, USA, which runs from February 14-16, 2025...

AI and Civil Service Purges
From Schneier on Security

AI and Civil Service Purges

Donald Trump and Elon Musk’s chaotic approach to reform is upending government operations. Critical functions have been halted, tens of thousands of federal staffers...

DOGE as a National Cyberattack
From Schneier on Security

DOGE as a National Cyberattack

In the span of just weeks, the US government has experienced what may be the most consequential security breach in its history—not through a sophisticated cyberattack...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account