acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Attacking Machine Learning Systems
From Schneier on Security

Attacking Machine Learning Systems

The field of machine learning (ML) security—and corresponding adversarial ML—is rapidly advancing as researchers develop sophisticated techniques to perturb, disrupt...

Friday Squid Blogging: Studying the Colossal Squid
From Schneier on Security

Friday Squid Blogging: Studying the Colossal Squid

A survey of giant squid science. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my bloghere...

Manipulating Weights in Face-Recognition AI Systems
From Schneier on Security

Manipulating Weights in Face-Recognition AI Systems

Interesting research: “Facial Misrecognition Systems: Simple Weight Manipulations Force DNNs to Err Only on Specific Persons“: Abstract: In this paper we describe...

AIs as Computer Hackers
From Schneier on Security

AIs as Computer Hackers

Hacker “Capture the Flag” has been a mainstay at hacker gatherings since the mid-1990s. It’s like the outdoor game, but played on computer networks. Teams of hackers...

Passwords Are Terrible (Surprising No One)
From Schneier on Security

Passwords Are Terrible (Surprising No One)

This is the result of a security audit: More than a fifth of the passwords protecting network accounts at the US Department of the Interior—including Password1234...

Ransomware Payments Are Down
From Schneier on Security

Ransomware Payments Are Down

Chainalysis reports that worldwide ransomware payments were down in 2022. Ransomware attackers extorted at least $456.8 million from victims in 2022, down from...

NIST Is Updating Its Cybersecurity Framework
From Schneier on Security

NIST Is Updating Its Cybersecurity Framework

NIST is planning a significant update of its Cybersecurity Framework. At this point, it’s asking for feedback and comments to its concept paper. Do the proposed...

Friday Squid Blogging: Squid-Inspired Hydrogel
From Schneier on Security

Friday Squid Blogging: Squid-Inspired Hydrogel

Scientists have created a hydrogel “using squid mantle and creative chemistry.” As usual, you can also use this squid post to talk about the security stories in...

Kevin Mitnick Hacked California Law in 1983
From Schneier on Security

Kevin Mitnick Hacked California Law in 1983

Early in his career, Kevin Mitnick successfully hacked California law. He told me the story when he heard about my new book, which he partially recounts his 2012...

A Guide to Phishing Attacks
From Schneier on Security

A Guide to Phishing Attacks

This is a good list of modern phishing techniques.

US Cyber Command Operations During the 2022 Midterm Elections
From Schneier on Security

US Cyber Command Operations During the 2022 Midterm Elections

The head of both US Cyber Command and the NSA, Gen. Paul Nakasone, broadly discussed that first organization’s offensive cyber operations during the runup to the...

Bulk Surveillance of Money Transfers
From Schneier on Security

Bulk Surveillance of Money Transfers

Just another obscure warrantless surveillance program. US law enforcement can access details of money transfers without a warrant through an obscure surveillance...

No-Fly List Exposed
From Schneier on Security

No-Fly List Exposed

I can’t remember the last time I thought about the US no-fly list: the list of people so dangerous they should never be allowed to fly on an airplane, yet so innocent...

Friday Squid Blogging: Another Giant Squid Captured on Video
From Schneier on Security

Friday Squid Blogging: Another Giant Squid Captured on Video

Here’s a new video of a giant squid, filmed in the Sea of Japan. I believe it’s injured. It’s so close to the surface, and not really moving very much. “We didn...

Real-World Steganography
From Schneier on Security

Real-World Steganography

From an article about Zheng Xiaoqing, an American convicted of spying for China: According to a Department of Justice (DOJ) indictment, the US citizen hid confidential...

Security Analysis of Threema
From Schneier on Security

Security Analysis of Threema

A group of Swiss researchers have published an impressive security analysis of Threema. We provide an extensive cryptographic analysis of Threema, a Swiss-based...

AI and Political Lobbying
From Schneier on Security

AI and Political Lobbying

Launched just weeks ago, ChatGPT is already threatening to upend how we draft everyday communications like emails, college essays and myriad other forms of writing...

The FBI Identified a Tor User
From Schneier on Security

The FBI Identified a Tor User

No details, though: According to the complaint against him, Al-Azhari allegedly visited a dark web site that hosts “unofficial propaganda and photographs related...

Hacked Cellebrite and MSAB Software Released
From Schneier on Security

Hacked Cellebrite and MSAB Software Released

Cellebrite is an cyberweapons arms manufacturer that sells smartphone forensic software to governments around the world. MSAB is a Swedish company that does the...

Upcoming Speaking Engagements
From Schneier on Security

Upcoming Speaking Engagements

This is a current list of where and when I am scheduled to speak: I’m speaking at Capricon, a four-day science fiction convention in Chicago. My talk is on “The...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account