acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Fooling an AI Article Writer
From Schneier on Security

Fooling an AI Article Writer

World of Warcraft players wrote about a fictional game element, “Glorbo,” on a subreddit for the game, trying to entice an AI bot to write an article about it.worked...

Backdoor in TETRA Police Radios
From Schneier on Security

Backdoor in TETRA Police Radios

Seems that there is a deliberate backdoor in the twenty-year-old TErrestrial Trunked RAdio (TETRA) standard used by police forces around the world. The European...

New York Using AI to Detect Subway Fare Evasion
From Schneier on Security

New York Using AI to Detect Subway Fare Evasion

The details are scant—the article is based on a “heavily redacted” contract—but the New York subway authority is using an “AI system” to detect people who don’t...

Google Reportedly Disconnecting Employees from the Internet
From Schneier on Security

Google Reportedly Disconnecting Employees from the Internet

Supposedly Google is starting a pilot program of disabling Internet connectivity from employee computers: The company will disable internet access on the select...

Friday Squid Blogging: Chromatophores
From Schneier on Security

Friday Squid Blogging: Chromatophores

Neat: Chromatophores are tiny color-changing cells in cephalopods. Watch them blink back and forth from purple to white on this squid’s skin in an Instagram video...

AI and Microdirectives
From Schneier on Security

AI and Microdirectives

Imagine a future in which AIs automatically interpret—and enforce—laws. All day and every day, you constantly receive highly personalized instructions for how to...

Kevin Mitnick Died
From Schneier on Security

Kevin Mitnick Died

Obituary.

Commentary on the Implementation Plan for the 2023 US National Cybersecurity Strategy
From Schneier on Security

Commentary on the Implementation Plan for the 2023 US National Cybersecurity Strategy

The Atlantic Council released a detailed commentary on the White House’s new “Implementation Plan for the 2023 US National Cybersecurity Strategy.” Lots of interesting...

Practice Your Security Prompting Skills
From Schneier on Security

Practice Your Security Prompting Skills

Gandalf is an interactive LLM game where the goal is to get the chatbot to reveal its password. There are eight levels of difficulty, as the chatbot gets increasingly...

Disabling Self-Driving Cars with a Traffic Cone
From Schneier on Security

Disabling Self-Driving Cars with a Traffic Cone

You can disable a self-driving car by putting a traffic cone on its hood: The group got the idea for the conings by chance. The person claims a few of them walking...

Tracking Down a Suspect through Cell Phone Records
From Schneier on Security

Tracking Down a Suspect through Cell Phone Records

Interesting forensics in connection with a serial killer arrest: Investigators went through phone records collected from both midtown Manhattan and the Massapequa...

Friday Squid Blogging: Balloon Squid
From Schneier on Security

Friday Squid Blogging: Balloon Squid

Masayoshi Matsumoto is a “master balloon artist,” and he made a squid (and other animals). As usual, you can also use this squid post to talk about the security...

Buying Campaign Contributions as a Hack
From Schneier on Security

Buying Campaign Contributions as a Hack

The first Republican primary debate has a popularity threshold to determine who gets to appear: 40,000 individual contributors. Now there are a lot of conventional...

French Police Will Be Able to Spy on People through Their Cell Phones
From Schneier on Security

French Police Will Be Able to Spy on People through Their Cell Phones

The French police are getting new surveillance powers: French police should be able to spy on suspects by remotely activating the camera, microphone and GPS of...

Google Is Using Its Vast Data Stores to Train AI
From Schneier on Security

Google Is Using Its Vast Data Stores to Train AI

No surprise, but Google just changed its privacy policy to reflect broader uses of all the surveillance data it has captured over the years: Research and development...

Privacy of Printing Services
From Schneier on Security

Privacy of Printing Services

The Washington Post has an article about popular printing services, and whether or not they read your documents and mine the data when you use them for printing...

Wisconsin Governor Hacks the Veto Process
From Schneier on Security

Wisconsin Governor Hacks the Veto Process

In my latest book, A Hacker’s Mind, I wrote about hacks as loophole exploiting. This is a great example: The Wisconsin governor used his line-item veto powers—supposedly...

Friday Squid Blogging: Giant Squid Nebula
From Schneier on Security

Friday Squid Blogging: Giant Squid Nebula

Pretty: A mysterious squid-like cosmic cloud, this nebula is very faint, but also very large in planet Earth’s sky. In the image, composed with 30 hours of narrowband...

The AI Dividend
From Schneier on Security

The AI Dividend

For four decades, Alaskans have opened their mailboxes to find checks waiting for them, their cut of the black gold beneath their feet. This is Alaska’s Permanent...

Belgian Tax Hack
From Schneier on Security

Belgian Tax Hack

Here’s a fascinating tax hack from Belgium (listen to the details here, episode #484 of “No Such Thing as a Fish,” at 28:00). Basically, it’s about a music festival...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account