acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
datePast Year
authorBruce Schneier
bg-corner

Microsoft is Soft-Launching Security Copilot
From Schneier on Security

Microsoft is Soft-Launching Security Copilot

Microsoft has announced an early access program for its LLM-based security chatbot assistant: Security Copilot. I am curious whether this thing is actually useful...

Child Exploitation and the Crypto Wars
From Schneier on Security

Child Exploitation and the Crypto Wars

Susan Landau published an excellent essay on the current justification for the government breaking end-to-end-encryption: child sexual abuse and exploitation (CSAE)...

Friday Squid Blogging: Why There Are No Giant Squid in Aquariums
From Schneier on Security

Friday Squid Blogging: Why There Are No Giant Squid in Aquariums

They’re too big and we can’t recreate their habitat. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered...

AI and US Election Rules
From Schneier on Security

AI and US Election Rules

If an AI breaks the rules for you, does that count as breaking the rules? This is the essential question being taken up by the Federal Election Commission thisAI...

Former Uber CISO Appealing His Conviction
From Schneier on Security

Former Uber CISO Appealing His Conviction

Joe Sullivan, Uber’s CEO during their 2016 data breach, is appealing his conviction. Prosecutors charged Sullivan, whom Uber hired as CISO after the 2014 breach...

Coin Flips Are Biased
From Schneier on Security

Coin Flips Are Biased

Experimental result: Many people have flipped coins but few have stopped to ponder the statistical and physical intricacies of the process. In a preregistered study...

Friday Squid Blogging: On Squid Intelligence
From Schneier on Security

Friday Squid Blogging: On Squid Intelligence

Article about squid intelligence. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog...

Hacking the High School Grading System
From Schneier on Security

Hacking the High School Grading System

Interesting New York Times article about high-school students hacking the grading system. What’s not helping? The policies many school districts are adopting that...

Model Extraction Attack on Neural Networks
From Schneier on Security

Model Extraction Attack on Neural Networks

Adi Shamir et al. have a new model extraction attack on neural networks: Polynomial Time Cryptanalytic Extraction of Neural Network Models Abstract: Billions of...

AI Risks
From Schneier on Security

AI Risks

There is no shortage of researchers and industry titans willing to warn us about the potential destructive power of artificial intelligence. Reading the headlines...

Deepfake Election Interference in Slovokia
From Schneier on Security

Deepfake Election Interference in Slovokia

Well designed and well timed deepfake or two Slovokian politicians discussing how to rig the election: Šimečka and Denník N immediately denounced the audio as fake...

Political Disinformation and AI
From Schneier on Security

Political Disinformation and AI

Elections around the world are facing an evolving threat from foreign actors, one that involves artificial intelligence. Countries trying to influence each other...

Malicious Ads in Bing Chat
From Schneier on Security

Malicious Ads in Bing Chat

Malicious ads are creeping into chatbots.

Hacking Gas Pumps via Bluetooth
From Schneier on Security

Hacking Gas Pumps via Bluetooth

Turns out pumps at gas stations are controlled via Bluetooth, and that the connections are insecure. No details in the article, but it seems that it’s easy to take...

NSA AI Security Center
From Schneier on Security

NSA AI Security Center

The NSA is starting a new artificial intelligence security center: The AI security center’s establishment follows an NSA study that identified securing AI models...

Friday Squid Blogging: Protecting Cephalopods in Medical Research
From Schneier on Security

Friday Squid Blogging: Protecting Cephalopods in Medical Research

From Nature: Cephalopods such as octopuses and squid could soon receive the same legal protection as mice and monkeys do when they are used in research. On 7 September...

Critical Vulnerability in libwebp Library
From Schneier on Security

Critical Vulnerability in libwebp Library

Both Apple and Google have recently reported critical vulnerabilities in their systems—iOS and Chrome, respectively—that are ultimately the result of the same vulnerability...

Signal Will Leave the UK Rather Than Add a Backdoor
From Schneier on Security

Signal Will Leave the UK Rather Than Add a Backdoor

Totally expected, but still good to hear: Onstage at TechCrunch Disrupt 2023, Meredith Whittaker, the president of the Signal Foundation, which maintains the nonprofit...

Friday Squid Blogging: New Squid Species
From Schneier on Security

Friday Squid Blogging: New Squid Species

An ancient squid: New research on fossils has revealed that a vampire-like ancient squid haunted Earth’s oceans 165 million years ago. The study, published in June...

New Revelations from the Snowden Documents
From Schneier on Security

New Revelations from the Snowden Documents

Jake Appelbaum’s PhD thesis contains several new revelations from the classified NSA documents provided to journalists by Edward Snowden. Nothing major, but a few...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account