acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Wisconsin Governor Hacks the Veto Process
From Schneier on Security

Wisconsin Governor Hacks the Veto Process

In my latest book, A Hacker’s Mind, I wrote about hacks as loophole exploiting. This is a great example: The Wisconsin governor used his line-item veto powers—supposedly...

Friday Squid Blogging: Giant Squid Nebula
From Schneier on Security

Friday Squid Blogging: Giant Squid Nebula

Pretty: A mysterious squid-like cosmic cloud, this nebula is very faint, but also very large in planet Earth’s sky. In the image, composed with 30 hours of narrowband...

The AI Dividend
From Schneier on Security

The AI Dividend

For four decades, Alaskans have opened their mailboxes to find checks waiting for them, their cut of the black gold beneath their feet. This is Alaska’s Permanent...

Belgian Tax Hack
From Schneier on Security

Belgian Tax Hack

Here’s a fascinating tax hack from Belgium (listen to the details here, episode #484 of “No Such Thing as a Fish,” at 28:00). Basically, it’s about a music festival...

Class-Action Lawsuit for Scraping Data without Permission
From Schneier on Security

Class-Action Lawsuit for Scraping Data without Permission

I have mixed feelings about this class-action lawsuit against OpenAI and Microsoft, claiming that it “scraped 300 billion words from the internet” without either...

The Password Game
From Schneier on Security

The Password Game

Amusing parody of password rules. BoingBoing: For example, at a certain level, your password must include today’s Wordle answer. And then there’s rule #27: “At...

Self-Driving Cars Are Surveillance Cameras on Wheels
From Schneier on Security

Self-Driving Cars Are Surveillance Cameras on Wheels

Police are already using self-driving car footage as video evidence: While security cameras are commonplace in American cities, self-driving cars represent a new...

Friday Squid Blogging: See-Through Squid
From Schneier on Security

Friday Squid Blogging: See-Through Squid

Doryteuthis opalescens is known as the market squid, and was critical in the recent squid RNA research. As usual, you can also use this squid post to talk about...

The US Is Spying on the UN Secretary General
From Schneier on Security

The US Is Spying on the UN Secretary General

The Washington Post is reporting that the US is spying on the UN Secretary General. The reports on Guterres appear to contain the secretary general’s personal conversations...

Stalkerware Vendor Hacked
From Schneier on Security

Stalkerware Vendor Hacked

The stalkerware company LetMeSpy has been hacked: TechCrunch reviewed the leaked data, which included years of victims’ call logs and text messages dating back...

Typing Incriminating Evidence in the Memo Field
From Schneier on Security

Typing Incriminating Evidence in the Memo Field

Don’t do it: Recently, the manager of the Harvard Med School morgue was accused of stealing and selling human body parts. Cedric Lodge and his wife Denise were...

Excel Data Forensics
From Schneier on Security

Excel Data Forensics

In this detailed article about academic plagiarism are some interesting details about how to do data forensics on Excel files. It really needs the graphics to understand...

Friday Squid Blogging: Giggling Squid
From Schneier on Security

Friday Squid Blogging: Giggling Squid

Giggling Squid is a Thai chain in the UK. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read...

UPS Data Harvested for SMS Phishing Attacks
From Schneier on Security

UPS Data Harvested for SMS Phishing Attacks

I get UPS phishing spam on my phone all the time. I never click on it, because it’s so obviously spam. Turns out that hackers have been harvesting actual UPS delivery...

AI as Sensemaking for Public Comments
From Schneier on Security

AI as Sensemaking for Public Comments

It’s become fashionable to think of artificial intelligence as an inherently dehumanizing technology, a ruthless force of automation that has unleashed legionsprognostications...

Ethical Problems in Computer Security
From Schneier on Security

Ethical Problems in Computer Security

Tadayoshi Kohno, Yasemin Acar, and Wulf Loh wrote excellent paper on ethical thinking within the computer security community: “Ethical Frameworks and Computer Security...

Power LED Side-Channel Attack
From Schneier on Security

Power LED Side-Channel Attack

This is a clever new <a href=”https://www.nassiben.com/video-based-crypta>side-channel attack: The first attack uses an Internet-connected surveillance camera to...

Friday Squid Blogging: Squid Can Edit Their RNA
From Schneier on Security

Friday Squid Blogging: Squid Can Edit Their RNA

This is just crazy: Scientists don’t yet know for sure why octopuses, and other shell-less cephalopods including squid and cuttlefish, are such prolific editors...

Security and Human Behavior (SHB) 2023
From Schneier on Security

Security and Human Behavior (SHB) 2023

I’m just back from the sixteenth Workshop on Security and Human Behavior, hosted by Alessandro Acquisti at Carnegie Mellon University in Pittsburgh. SHB is a small...

On the Need for an AI Public Option
From Schneier on Security

On the Need for an AI Public Option

Artificial intelligence will bring great benefits to all of humanity. But do we really want to entrust this revolutionary technology solely to a small group ofretired...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account