acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Parmesan Anti-Forgery Protection
From Schneier on Security

Parmesan Anti-Forgery Protection

The Guardian is reporting about microchips in wheels of Parmesan cheese as an anti-forgery measure.

Applying AI to License Plate Surveillance
From Schneier on Security

Applying AI to License Plate Surveillance

License plate scanners aren’t new. Neither is using them for bulk surveillance. What’s new is that AI is being used on the data, identifying “suspicious” vehicle...

White House Announces AI Cybersecurity Challenge
From Schneier on Security

White House Announces AI Cybersecurity Challenge

At Black Hat last week, the White House announced an AI Cyber Challenge. Gizmodo reports: The new AI cyber challenge (which is being abbreviated “AIxCC”) will have...

Friday Squid Blogging: Squid Brand Fish Sauce
From Schneier on Security

Friday Squid Blogging: Squid Brand Fish Sauce

Squid Brand is a Thai company that makes fish sauce: It is part of Squid Brand’s range of “personalized healthy fish sauces” that cater to different consumer groups...

Bots Are Better than Humans at Solving CAPTCHAs
From Schneier on Security

Bots Are Better than Humans at Solving CAPTCHAs

Interesting research: “An Empirical Study & Evaluation of Modern CAPTCHAs“: Abstract: For nearly two decades, CAPTCHAS have been widely used as a means of protection...

Detecting “Violations of Social Norms” in Text with AI
From Schneier on Security

Detecting “Violations of Social Norms” in Text with AI

Researchers are trying to use AI to detect “social norms violations.” Feels a little sketchy right now, but this is the sort of thing that AIs will get better at...

UK Electoral Commission Hacked
From Schneier on Security

UK Electoral Commission Hacked

The UK Electoral Commission discovered last year that it was hacked the year before. That’s fourteen months between the hack and the discovery. It doesn’t know...

Friday Squid Blogging: NIWA Annual Squid Survey
From Schneier on Security

Friday Squid Blogging: NIWA Annual Squid Survey

Results from the National Institute of Water and Atmospheric Research Limited annual squid survey: This year, the team unearthed spectacular large hooked squids...

The Inability to Simultaneously Verify Sentience, Location, and Identity
From Schneier on Security

The Inability to Simultaneously Verify Sentience, Location, and Identity

Really interesting “systematization of knowledge” paper: “SoK: The Ghost Trilemma” Abstract: Trolls, bots, and sybils distort online discourse and compromise the...

Cryptographic Flaw in Libbitcoin Explorer Cryptocurrency Wallet
From Schneier on Security

Cryptographic Flaw in Libbitcoin Explorer Cryptocurrency Wallet

Cryptographic flaws still matter. Here’s a flaw in the random-number generator used to create private keys. The seed has only 32 bits of entropy. Seems like this...

Using Machine Learning to Detect Keystrokes
From Schneier on Security

Using Machine Learning to Detect Keystrokes

Researchers have trained a ML model to detect keystrokes by sound with 95% accuracy. “A Practical Deep Learning-Based Acoustic Side Channel Attack on Keyboards...

Microsoft Signing Key Stolen by Chinese
From Schneier on Security

Microsoft Signing Key Stolen by Chinese

A bunch of networks, including US Government networks, have been hacked by the Chinese. The hackers used forged authentication tokens to access user email, using...

Friday Squid Blogging: 2023 Squid Oil Global Market Report
From Schneier on Security

Friday Squid Blogging: 2023 Squid Oil Global Market Report

I had no idea that squid contain sufficient oil to be worth extracting. As usual, you can also use this squid post to talk about the security stories in the news...

Political Milestones for AI
From Schneier on Security

Political Milestones for AI

ChatGPT was released just nine months ago, and we are still learning how it will affect our daily lives, our careers, and even our systems of self-governance. But...

The Need for Trustworthy AI
From Schneier on Security

The Need for Trustworthy AI

If you ask Alexa, Amazon’s voice assistant AI system, whether Amazon is a monopoly, it responds by saying it doesn’t know. It doesn’t take much to make it lambaste...

New SEC Rules around Cybersecurity Incident Disclosures
From Schneier on Security

New SEC Rules around Cybersecurity Incident Disclosures

The US Securities and Exchange Commission adopted final rules around the disclosure of cybersecurity incidents. There are two basic rules: Public companies must...

Hacking AI Resume Screening with Text in a White Font
From Schneier on Security

Hacking AI Resume Screening with Text in a White Font

The Washington Post is reporting on a hack to fool automatic resume sorting programs: putting text in a white font. The idea is that the programs rely primarily...

Automatically Finding Prompt Injection Attacks
From Schneier on Security

Automatically Finding Prompt Injection Attacks

Researchers have just published a paper showing how to automate the discovery of prompt injection attacks. They look something like this: Write a tutorial on how...

Friday Squid Blogging: Zaqistan Flag
From Schneier on Security

Friday Squid Blogging: Zaqistan Flag

The fictional nation of Zaqistan (in Utah) has a squid on its flag. As usual, you can also use this squid post to talk about the security stories in the news that...

Indirect Instruction Injection in Multi-Modal LLMs
From Schneier on Security

Indirect Instruction Injection in Multi-Modal LLMs

Interesting research: “(Ab)using Images and Sounds for Indirect Instruction Injection in Multi-Modal LLMs“: Abstract: We demonstrate how images and sounds can be...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account