acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Friday Squid Blogging: Giant Squid Video
From Schneier on Security

Friday Squid Blogging: Giant Squid Video

A video—authentic, not a deep fake—of a giant squid close to the surface. As usual, you can also use this squid post to talk about the security stories in the news...

Ted Chiang on the Risks of AI
From Schneier on Security

Ted Chiang on the Risks of AI

Ted Chiang has an excellent essay in the New Yorker: “Will A.I. Become the New McKinsey?” The question we should be asking is: as A.I. becomes more powerful and...

Building Trustworthy AI
From Schneier on Security

Building Trustworthy AI

We will all soon get into the habit of using AI tools for help with everyday problems and tasks. We should get in the habit of questioning the motives, incentives...

FBI Disables Russian Malware
From Schneier on Security

FBI Disables Russian Malware

Reuters is reporting that the FBI “had identified and disabled malware wielded by Russia’s FSB security service against an undisclosed number of American computers...

PIPEDREAM Malware against Industrial Control Systems
From Schneier on Security

PIPEDREAM Malware against Industrial Control Systems

Another nation-state malware, Russian in origin: In the early stages of the war in Ukraine in 2022, PIPEDREAM, a known malware was quietly on the brink of wiping...

AI Hacking Village at DEF CON This Year
From Schneier on Security

AI Hacking Village at DEF CON This Year

At DEF CON this year, Anthropic, Google, Hugging Face, Microsoft, NVIDIA, OpenAI and Stability AI will all open up their models for attack. The DEF CON event will...

Friday Squid Blogging: “Mediterranean Beef Squid” Hoax
From Schneier on Security

Friday Squid Blogging: “Mediterranean Beef Squid” Hoax

The viral video of the “Mediterranean beef squid”is a hoax. It’s not even a deep fake; it’s a plastic toy. As usual, you can also use this squid post to talk about...

Large Language Models and Elections
From Schneier on Security

Large Language Models and Elections

Earlier this week, the Republican National Committee released a video that it claims was “built entirely with AI imagery.” The content of the ad isn’t especially...

SolarWinds Detected Six Months Earlier
From Schneier on Security

SolarWinds Detected Six Months Earlier

New reporting from Wired reveals that the Department of Justice detected the SolarWinds attack six months before Mandient detected it in December 2020, but didn...

NIST Draft Document on Post-Quantum Cryptography Guidance
From Schneier on Security

NIST Draft Document on Post-Quantum Cryptography Guidance

NIST has release a draft of Special Publication1800-38A: Migration to Post-Quantum Cryptography: Preparation for Considering the Implementation and Adoption of....

Friday Squid Blogging: More Squid Camouflage Research
From Schneier on Security

Friday Squid Blogging: More Squid Camouflage Research

Here’s a research group trying to replicate squid cell transparency in mammalian cells. As usual, you can also use this squid post to talk about the security stories...

Hacking the Layoff Process
From Schneier on Security

Hacking the Layoff Process

My latest book, A Hacker’s Mind, is filled with stories about the rich and powerful hacking systems, but it was hard to find stories of the hacking by the lessarticle...

Security Risks of AI
From Schneier on Security

Security Risks of AI

Stanford and Georgetown have a new report on the security risks of AI—particularly adversarial machine learning—based on a workshop they held on the topic. Jimblog...

AI to Aid Democracy
From Schneier on Security

AI to Aid Democracy

There’s good reason to fear that A.I. systems like ChatGPT and GPT4 will harm democracy. Public debate may be overwhelmed by industrial quantities of autogenerated...

Cyberweapons Manufacturer QuaDream Shuts Down
From Schneier on Security

Cyberweapons Manufacturer QuaDream Shuts Down

Following a report on its activities, the Israeli spyware company QuaDream has shut down. This was QuadDream: Key Findings Based on an analysis of samples shared...

UK Threatens End-to-End Encryption
From Schneier on Security

UK Threatens End-to-End Encryption

In an open letter, seven secure messaging apps—including Signal and WhatsApp—point out that the UK’s Online Safety Bill could destroy end-to-end encryption: As...

Friday Squid Blogging: More on Squid Fishing
From Schneier on Security

Friday Squid Blogging: More on Squid Fishing

The squid you eat most likely comes from unregulated waters. As usual, you can also use this squid post to talk about the security stories in the news that I haven...

Hacking Pickleball
From Schneier on Security

Hacking Pickleball

My latest book, A Hacker’s Mind, has a lot of sports stories. Sports are filled with hacks, as players look for every possible advantage that doesn’t explicitly...

Using the iPhone Recovery Key to Lock Owners Out of Their iPhones
From Schneier on Security

Using the iPhone Recovery Key to Lock Owners Out of Their iPhones

This a good example of a security feature that can sometimes harm security: Apple introduced the optional recovery key in 2020 to protect users from online hackers...

New Zero-Click Exploits Against iOS
From Schneier on Security

New Zero-Click Exploits Against iOS

CitizenLab has identified three zero-click exploits against iOS 15 and 16. These were used by NSO Group’s Pegasus spyware in 2022, and deployed by Mexico against...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account