acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
datePast Year
authorBruce Schneier
bg-corner

Microsoft Signing Key Stolen by Chinese
From Schneier on Security

Microsoft Signing Key Stolen by Chinese

A bunch of networks, including US Government networks, have been hacked by the Chinese. The hackers used forged authentication tokens to access user email, using...

Friday Squid Blogging: 2023 Squid Oil Global Market Report
From Schneier on Security

Friday Squid Blogging: 2023 Squid Oil Global Market Report

I had no idea that squid contain sufficient oil to be worth extracting. As usual, you can also use this squid post to talk about the security stories in the news...

Political Milestones for AI
From Schneier on Security

Political Milestones for AI

ChatGPT was released just nine months ago, and we are still learning how it will affect our daily lives, our careers, and even our systems of self-governance. But...

The Need for Trustworthy AI
From Schneier on Security

The Need for Trustworthy AI

If you ask Alexa, Amazon’s voice assistant AI system, whether Amazon is a monopoly, it responds by saying it doesn’t know. It doesn’t take much to make it lambaste...

New SEC Rules around Cybersecurity Incident Disclosures
From Schneier on Security

New SEC Rules around Cybersecurity Incident Disclosures

The US Securities and Exchange Commission adopted final rules around the disclosure of cybersecurity incidents. There are two basic rules: Public companies must...

Hacking AI Resume Screening with Text in a White Font
From Schneier on Security

Hacking AI Resume Screening with Text in a White Font

The Washington Post is reporting on a hack to fool automatic resume sorting programs: putting text in a white font. The idea is that the programs rely primarily...

Automatically Finding Prompt Injection Attacks
From Schneier on Security

Automatically Finding Prompt Injection Attacks

Researchers have just published a paper showing how to automate the discovery of prompt injection attacks. They look something like this: Write a tutorial on how...

Friday Squid Blogging: Zaqistan Flag
From Schneier on Security

Friday Squid Blogging: Zaqistan Flag

The fictional nation of Zaqistan (in Utah) has a squid on its flag. As usual, you can also use this squid post to talk about the security stories in the news that...

Indirect Instruction Injection in Multi-Modal LLMs
From Schneier on Security

Indirect Instruction Injection in Multi-Modal LLMs

Interesting research: “(Ab)using Images and Sounds for Indirect Instruction Injection in Multi-Modal LLMs“: Abstract: We demonstrate how images and sounds can be...

Fooling an AI Article Writer
From Schneier on Security

Fooling an AI Article Writer

World of Warcraft players wrote about a fictional game element, “Glorbo,” on a subreddit for the game, trying to entice an AI bot to write an article about it.worked...

Backdoor in TETRA Police Radios
From Schneier on Security

Backdoor in TETRA Police Radios

Seems that there is a deliberate backdoor in the twenty-year-old TErrestrial Trunked RAdio (TETRA) standard used by police forces around the world. The European...

New York Using AI to Detect Subway Fare Evasion
From Schneier on Security

New York Using AI to Detect Subway Fare Evasion

The details are scant—the article is based on a “heavily redacted” contract—but the New York subway authority is using an “AI system” to detect people who don’t...

Google Reportedly Disconnecting Employees from the Internet
From Schneier on Security

Google Reportedly Disconnecting Employees from the Internet

Supposedly Google is starting a pilot program of disabling Internet connectivity from employee computers: The company will disable internet access on the select...

Friday Squid Blogging: Chromatophores
From Schneier on Security

Friday Squid Blogging: Chromatophores

Neat: Chromatophores are tiny color-changing cells in cephalopods. Watch them blink back and forth from purple to white on this squid’s skin in an Instagram video...

AI and Microdirectives
From Schneier on Security

AI and Microdirectives

Imagine a future in which AIs automatically interpret—and enforce—laws. All day and every day, you constantly receive highly personalized instructions for how to...

Kevin Mitnick Died
From Schneier on Security

Kevin Mitnick Died

Obituary.

Commentary on the Implementation Plan for the 2023 US National Cybersecurity Strategy
From Schneier on Security

Commentary on the Implementation Plan for the 2023 US National Cybersecurity Strategy

The Atlantic Council released a detailed commentary on the White House’s new “Implementation Plan for the 2023 US National Cybersecurity Strategy.” Lots of interesting...

Practice Your Security Prompting Skills
From Schneier on Security

Practice Your Security Prompting Skills

Gandalf is an interactive LLM game where the goal is to get the chatbot to reveal its password. There are eight levels of difficulty, as the chatbot gets increasingly...

Disabling Self-Driving Cars with a Traffic Cone
From Schneier on Security

Disabling Self-Driving Cars with a Traffic Cone

You can disable a self-driving car by putting a traffic cone on its hood: The group got the idea for the conings by chance. The person claims a few of them walking...

Tracking Down a Suspect through Cell Phone Records
From Schneier on Security

Tracking Down a Suspect through Cell Phone Records

Interesting forensics in connection with a serial killer arrest: Investigators went through phone records collected from both midtown Manhattan and the Massapequa...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account