acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Seeing Like a Data Structure
From Schneier on Security

Seeing Like a Data Structure

Technology was once simply a tool—and a small one at that—used to amplify human intent and capacity. That was the story of the industrial revolution: we could control...

AI Will Increase the Quantity—and Quality—of Phishing Scams
From Schneier on Security

AI Will Increase the Quantity—and Quality—of Phishing Scams

A piece I coauthored with Fredrik Heiding and Arun Vishwanath in the Harvard Business Review: Summary. Gen AI tools are rapidly making these emails more advanced...

Friday Squid Blogging: Baby Colossal Squid
From Schneier on Security

Friday Squid Blogging: Baby Colossal Squid

This video might be a juvenile colossal squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered....

How AI Will Change Democracy
From Schneier on Security

How AI Will Change Democracy

I don’t think it’s an exaggeration to predict that artificial intelligence will affect every aspect of our society. Not by doing new things. But mostly by doing...

Supply Chain Attack against Courtroom Software
From Schneier on Security

Supply Chain Attack against Courtroom Software

No word on how this backdoor was installed: A software maker serving more than 10,000 courtrooms throughout the world hosted an application update containing a...

Privacy Implications of Tracking Wireless Access Points
From Schneier on Security

Privacy Implications of Tracking Wireless Access Points

Brian Krebs reports on research into geolocating routers: Apple and the satellite-based broadband service Starlink each recently took steps to address new research...

Lattice-Based Cryptosystems and Quantum Cryptanalysis
From Schneier on Security

Lattice-Based Cryptosystems and Quantum Cryptanalysis

Quantum computers are probably coming, though we don’t know when—and when they arrive, they will, most likely, be able to break our standard public-key cryptography...

Friday Squid Blogging: Dana Squid Attacking Camera
From Schneier on Security

Friday Squid Blogging: Dana Squid Attacking Camera

Fantastic footage of a Dana squid attacking a camera at a depth of about a kilometer. As usual, you can also use this squid post to talk about the security stories...

On the Zero-Day Market
From Schneier on Security

On the Zero-Day Market

New paper: “Zero Progress on Zero Days: How the Last Ten Years Created the Modern Spyware Market“: Abstract: Spyware makes surveillance simple. The last ten years...

Personal AI Assistants and Privacy
From Schneier on Security

Personal AI Assistants and Privacy

Microsoft is trying to create a personal digital assistant: At a Build conference event on Monday, Microsoft revealed a new AI-powered feature called “Recall” for...

Unredacting Pixelated Text
From Schneier on Security

Unredacting Pixelated Text

Experiments in unredacting text that has been pixelated.

Detecting Malicious Trackers
From Schneier on Security

Detecting Malicious Trackers

From Slashdot: Apple and Google have launched a new industry standard called “Detecting Unwanted Location Trackers” to combat the misuse of Bluetooth trackers....

IBM Sells Cybersecurity Group
From Schneier on Security

IBM Sells Cybersecurity Group

IBM is selling its QRadar product suite to Palo Alto Networks, for an undisclosed—but probably surprisingly small—sum. I have a personal connection to this. Inbought...

Friday Squid Blogging: Emotional Support Squid
From Schneier on Security

Friday Squid Blogging: Emotional Support Squid

When asked what makes this an “emotional support squid” and not just another stuffed animal, its creator says: They’re emotional support squid because they’re large...

FBI Seizes BreachForums Website
From Schneier on Security

FBI Seizes BreachForums Website

The FBI has seized the BreachForums website, used by ransomware criminals to leak stolen corporate data. If law enforcement has gained access to the hacking forum...

Zero-Trust DNS
From Schneier on Security

Zero-Trust DNS

Microsoft is working on a promising-looking protocol to lock down DNS. ZTDNS aims to solve this decades-old problem by integrating the Windows DNS engine with...

Upcoming Speaking Engagements
From Schneier on Security

Upcoming Speaking Engagements

This is a current list of where and when I am scheduled to speak: I’m giving a webinar via Zoom on Wednesday, May 22, at 11:00 AM ET. The topic is “Should the“...

Another Chrome Vulnerability
From Schneier on Security

Another Chrome Vulnerability

Google has patched another Chrome zero-day: On Thursday, Google said an anonymous source notified it of the vulnerability. The vulnerability carries a severity...

Friday Squid Blogging: Squid Mating Strategies
From Schneier on Security

Friday Squid Blogging: Squid Mating Strategies

Some squids are “consorts,” others are “sneakers.” The species is healthiest when individuals have different strategies randomly. As usual, you can also use this...

New Attack Against Self-Driving Car AI
From Schneier on Security

New Attack Against Self-Driving Car AI

This is another attack that convinces the AI to ignore road signs: Due to the way CMOS cameras operate, rapidly changing light from fast flashing diodes can be...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account