acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorschneier
bg-corner

Threats of Machine-Generated Text
From Schneier on Security

Threats of Machine-Generated Text

With the release of ChatGPT, I’ve read many random articles about this or that threat from the technology. This paper is a good survey of the field: what the threats...

Experian Privacy Vulnerability
From Schneier on Security

Experian Privacy Vulnerability

Brian Krebs is reporting on a vulnerability in Experian’s website: Identity thieves have been exploiting a glaring security weakness in the website of Experian,...

ChatGPT-Written Malware
From Schneier on Security

ChatGPT-Written Malware

I don’t know how much of a thing this will end up being, but we are seeing ChatGPT-written malware in the wild. …within a few weeks of ChatGPT going live, participants...

Identifying People Using Cell Phone Location Data
From Schneier on Security

Identifying People Using Cell Phone Location Data

The two people who shut down four Washington power stations in December were arrested. This is the interesting part: Investigators identified Greenwood and Crahan...

Friday Squid Blogging: Squid Fetish
From Schneier on Security

Friday Squid Blogging: Squid Fetish

Seems that about 1.5% of people have a squid fetish. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered...

Schneier on Security Audiobook Sale
From Schneier on Security

Schneier on Security Audiobook Sale

I’m not sure why, but Audiobooks.com is offering the audiobook version of Schneier on Security at 50% off until January 17.

Remote Vulnerabilities in Automobiles
From Schneier on Security

Remote Vulnerabilities in Automobiles

This group has found a ton of remote vulnerabilities in all sorts of automobiles. It’s enough to make you want to buy a car that is not Internet-connected. Unfortunately...

Decarbonizing Cryptocurrencies through Taxation
From Schneier on Security

Decarbonizing Cryptocurrencies through Taxation

Maintaining bitcoin and other cryptocurrencies causes about 0.3 percent of global CO2 emissions. That may not sound like a lot, but it’s more than the emissions...

Breaking RSA with a Quantum Computer
From Schneier on Security

Breaking RSA with a Quantum Computer

A group of Chinese researchers have just published a paper claiming that they can—although they have not yet done so—break 2048-bit RSA. This is something to take...

Friday Squid Blogging: Grounded Fishing Boat Carrying 16,000 Pounds of Squid
From Schneier on Security

Friday Squid Blogging: Grounded Fishing Boat Carrying 16,000 Pounds of Squid

Rough seas are hampering efforts to salvage the boat: The Speranza Marie, carrying 16,000 pounds of squid and some 1,000 gallons of diesel fuel, hit the shoreline...

Recovering Smartphone Voice from the Accelerometer
From Schneier on Security

Recovering Smartphone Voice from the Accelerometer

Yet another smartphone side-channel attack: “EarSpy: Spying Caller Speech and Identity through Tiny Vibrations of Smartphone Ear Speakers“: Abstract: Eavesdropping...

QR Code Scam
From Schneier on Security

QR Code Scam

An enterprising individual made fake parking tickets with a QR code for easy payment.

Arresting IT Administrators
From Schneier on Security

Arresting IT Administrators

This is one way of ensuring that IT keeps up with patches: Albanian prosecutors on Wednesday asked for the house arrest of five public employees they blame for...

LastPass Breach
From Schneier on Security

LastPass Breach

Last August, LastPass reported a security breach, saying that no customer information—or passwords—were compromised. Turns out the full story is worse: While no...

Friday Squid Blogging: Injured Giant Squid and Paddleboarder
From Schneier on Security

Friday Squid Blogging: Injured Giant Squid and Paddleboarder

Here’s a video—I don’t know where it’s from—of an injured juvenile male giant squid grabbing on to a paddleboard. As usual, you can also use this squid post tohere...

Hacking the JFK Airport Taxi Dispatch System
From Schneier on Security

Hacking the JFK Airport Taxi Dispatch System

Two men have been convicted of hacking the taxi dispatch system at the JFK airport. This enabled them to reorder the taxis on the list; they charged taxi drivers...

Critical Microsoft Code-Execution Vulnerability
From Schneier on Security

Critical Microsoft Code-Execution Vulnerability

A critical code-execution vulnerability in Microsoft Windows was patched in September. It seems that researchers just realized how serious it was (and is): Like...

Trojaned Windows Installer Targets Ukraine
From Schneier on Security

Trojaned Windows Installer Targets Ukraine

Mandiant is reporting on a trojaned Windows installer that targets Ukrainian users. The installer was left on various torrent sites, presumably ensnaring people...

How to Surrender to a Drone
From Schneier on Security

How to Surrender to a Drone

The Ukrainian army has released an instructional video explaining how Russian soldiers should surrender to a drone: “Seeing the drone in the field of view, make...

Friday Squid Blogging: Squid in Concert
From Schneier on Security

Friday Squid Blogging: Squid in Concert

Squid is performing a concert in London in February. If you don’t know what their music is like, try this or this or this. As usual, you can also use this squid...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account