acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Messaging Service Wiretap Discovered through Expired TLS Cert
From Schneier on Security

Messaging Service Wiretap Discovered through Expired TLS Cert

Fascinating story of a covert wiretap that was discovered because of an expired TLS certificate: The suspected man-in-the-middle attack was identified when the...

New NSA Information from (and About) Snowden
From Schneier on Security

New NSA Information from (and About) Snowden

Interesting article about the Snowden documents, including comments from former Guardian editor Ewen MacAskill MacAskill, who shared the Pulitzer Prize for Public...

Microsoft is Soft-Launching Security Copilot
From Schneier on Security

Microsoft is Soft-Launching Security Copilot

Microsoft has announced an early access program for its LLM-based security chatbot assistant: Security Copilot. I am curious whether this thing is actually useful...

Child Exploitation and the Crypto Wars
From Schneier on Security

Child Exploitation and the Crypto Wars

Susan Landau published an excellent essay on the current justification for the government breaking end-to-end-encryption: child sexual abuse and exploitation (CSAE)...

Friday Squid Blogging: Why There Are No Giant Squid in Aquariums
From Schneier on Security

Friday Squid Blogging: Why There Are No Giant Squid in Aquariums

They’re too big and we can’t recreate their habitat. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered...

AI and US Election Rules
From Schneier on Security

AI and US Election Rules

If an AI breaks the rules for you, does that count as breaking the rules? This is the essential question being taken up by the Federal Election Commission thisAI...

Former Uber CISO Appealing His Conviction
From Schneier on Security

Former Uber CISO Appealing His Conviction

Joe Sullivan, Uber’s CEO during their 2016 data breach, is appealing his conviction. Prosecutors charged Sullivan, whom Uber hired as CISO after the 2014 breach...

Coin Flips Are Biased
From Schneier on Security

Coin Flips Are Biased

Experimental result: Many people have flipped coins but few have stopped to ponder the statistical and physical intricacies of the process. In a preregistered study...

Friday Squid Blogging: On Squid Intelligence
From Schneier on Security

Friday Squid Blogging: On Squid Intelligence

Article about squid intelligence. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog...

Hacking the High School Grading System
From Schneier on Security

Hacking the High School Grading System

Interesting New York Times article about high-school students hacking the grading system. What’s not helping? The policies many school districts are adopting that...

Model Extraction Attack on Neural Networks
From Schneier on Security

Model Extraction Attack on Neural Networks

Adi Shamir et al. have a new model extraction attack on neural networks: Polynomial Time Cryptanalytic Extraction of Neural Network Models Abstract: Billions of...

AI Risks
From Schneier on Security

AI Risks

There is no shortage of researchers and industry titans willing to warn us about the potential destructive power of artificial intelligence. Reading the headlines...

Deepfake Election Interference in Slovokia
From Schneier on Security

Deepfake Election Interference in Slovokia

Well designed and well timed deepfake or two Slovokian politicians discussing how to rig the election: Šimečka and Denník N immediately denounced the audio as fake...

Political Disinformation and AI
From Schneier on Security

Political Disinformation and AI

Elections around the world are facing an evolving threat from foreign actors, one that involves artificial intelligence. Countries trying to influence each other...

Malicious Ads in Bing Chat
From Schneier on Security

Malicious Ads in Bing Chat

Malicious ads are creeping into chatbots.

Hacking Gas Pumps via Bluetooth
From Schneier on Security

Hacking Gas Pumps via Bluetooth

Turns out pumps at gas stations are controlled via Bluetooth, and that the connections are insecure. No details in the article, but it seems that it’s easy to take...

NSA AI Security Center
From Schneier on Security

NSA AI Security Center

The NSA is starting a new artificial intelligence security center: The AI security center’s establishment follows an NSA study that identified securing AI models...

Friday Squid Blogging: Protecting Cephalopods in Medical Research
From Schneier on Security

Friday Squid Blogging: Protecting Cephalopods in Medical Research

From Nature: Cephalopods such as octopuses and squid could soon receive the same legal protection as mice and monkeys do when they are used in research. On 7 September...

Critical Vulnerability in libwebp Library
From Schneier on Security

Critical Vulnerability in libwebp Library

Both Apple and Google have recently reported critical vulnerabilities in their systems—iOS and Chrome, respectively—that are ultimately the result of the same vulnerability...

Signal Will Leave the UK Rather Than Add a Backdoor
From Schneier on Security

Signal Will Leave the UK Rather Than Add a Backdoor

Totally expected, but still good to hear: Onstage at TechCrunch Disrupt 2023, Meredith Whittaker, the president of the Signal Foundation, which maintains the nonprofit...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account