acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

AIs Hacking Websites
From Schneier on Security

AIs Hacking Websites

New research: LLM Agents can Autonomously Hack Websites Abstract: In recent years, large language models (LLMs) have become increasingly capable and can now interact...

New Image/Video Prompt Injection Attacks
From Schneier on Security

New Image/Video Prompt Injection Attacks

Simon Willison has been playing with the video processing capabilities of the new Gemini Pro 1.5 model from Google, and it’s really impressive. Which means a lot...

Details of a Phone Scam
From Schneier on Security

Details of a Phone Scam

First-person account of someone who fell for a scam, that started as a fake Amazon service rep and ended with a fake CIA agent, and lost $50,000 cash. And thisCory...

Microsoft Is Spying on Users of Its AI Tools
From Schneier on Security

Microsoft Is Spying on Users of Its AI Tools

Microsoft announced that it caught Chinese, Russian, and Iranian hackers using its AI tools—presumably coding tools—to improve their hacking abilities. From their...

EU Court of Human Rights Rejects Encryption Backdoors
From Schneier on Security

EU Court of Human Rights Rejects Encryption Backdoors

The European Court of Human Rights has ruled that breaking end-to-end encryption by adding backdoors violates human rights: Seemingly most critically, the [Russian]...

Friday Squid Blogging: Vegan Squid-Ink Pasta
From Schneier on Security

Friday Squid Blogging: Vegan Squid-Ink Pasta

It uses black beans for color and seaweed for flavor. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered...

On the Insecurity of Software Bloat
From Schneier on Security

On the Insecurity of Software Bloat

Good essay on software bloat and the insecurities it causes. The world ships too much code, most of it by third parties, sometimes unintended, most of it uninspected...

Improving the Cryptanalysis of Lattice-Based Public-Key Algorithms
From Schneier on Security

Improving the Cryptanalysis of Lattice-Based Public-Key Algorithms

The winner of the Best Paper Award at Crypto this year was a significant improvement to lattice-based cryptanalysis. This is important, because a bunch of NIST’s...

Molly White Reviews Blockchain Book
From Schneier on Security

Molly White Reviews Blockchain Book

Molly White—of “Web3 is Going Just Great” fame—reviews Chris Dixon’s blockchain solutions book: Read Write Own: In fact, throughout the entire book, Dixon fails...

On Passkey Usability
From Schneier on Security

On Passkey Usability

Matt Burgess tries to only use passkeys. The results are mixed.

Friday Squid Blogging: A Penguin Named “Squid”
From Schneier on Security

Friday Squid Blogging: A Penguin Named “Squid”

Amusing story about a penguin named “Squid.” As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read...

No, Toothbrushes Were Not Used in a Massive DDoS Attack
From Schneier on Security

No, Toothbrushes Were Not Used in a Massive DDoS Attack

The widely reported story last week that 1.5 million smart toothbrushes were hacked and used in a DDoS attack is false. Near as I can tell, a German reporter talking...

On Software Liabilities
From Schneier on Security

On Software Liabilities

Over on Lawfare, Jim Dempsey published a really interesting proposal for software liability: “Standard for Software Liability: Focus on the Product for Liability...

Teaching LLMs to Be Deceptive
From Schneier on Security

Teaching LLMs to Be Deceptive

Interesting research: “Sleeper Agents: Training Deceptive LLMs that Persist Through Safety Training“: Abstract: Humans are capable of strategically deceptive behavior...

Deepfake Fraud
From Schneier on Security

Deepfake Fraud

A deepfake video conference call—with everyone else on the call a fake—fooled a finance worker into sending $25M to the criminals’ account.

Friday Squid Blogging: Illex Squid in Argentina Waters
From Schneier on Security

Friday Squid Blogging: Illex Squid in Argentina Waters

Argentina is reporting that there is a good population of illex squid in its waters ready for fishing, and is working to ensure that Chinese fishing boats don’t...

David Kahn
From Schneier on Security

David Kahn

David Kahn has died. His groundbreaking book, The Codebreakers was the first serious book I read about codebreaking, and one of the primary reasons I entered this...

A Self-Enforcing Protocol to Solve Gerrymandering
From Schneier on Security

A Self-Enforcing Protocol to Solve Gerrymandering

In 2009, I wrote: There are several ways two people can divide a piece of cake in half. One way is to find someone impartial to do it for them. This works, but...

New Images of Colossus Released
From Schneier on Security

New Images of Colossus Released

GCHQ has released new images of the WWII Colossus code-breaking computer, celebrating the machine’s eightieth anniversary (birthday?). News article.

NSA Buying Bulk Surveillance Data on Americans without a Warrant
From Schneier on Security

NSA Buying Bulk Surveillance Data on Americans without a Warrant

It finally admitted to buying bulk data on Americans from data brokers, in response to a query by Senator Weyden. This is almost certainly illegal, although the...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account