acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Friday Squid Blogging: Eating Bioluminescent Squid
From Schneier on Security

Friday Squid Blogging: Eating Bioluminescent Squid

Firefly squid is now a delicacy in New York. Blog moderation policy.

“Emergent Misalignment” in LLMs
From Schneier on Security

“Emergent Misalignment” in LLMs

Interesting research: “Emergent Misalignment: Narrow finetuning can produce broadly misaligned LLMs“: Abstract: We present a surprising result regarding LLMs and...

An iCloud Backdoor Would Make Our Phones Less Safe
From Schneier on Security

An iCloud Backdoor Would Make Our Phones Less Safe

Last month, the UK government demanded that Apple weaken the security of iCloud for users worldwide. On Friday, Apple took steps to comply for users in the United...

North Korean Hackers Steal $1.5B in Cryptocurrency
From Schneier on Security

North Korean Hackers Steal $1.5B in Cryptocurrency

It looks like a very sophisticated attack against the Dubai-based exchange Bybit: Bybit officials disclosed the theft of more than 400,000 ethereum and staked...

More Research Showing AI Breaking the Rules
From Schneier on Security

More Research Showing AI Breaking the Rules

These researchers had LLMs play chess against better opponents. When they couldn’t win, they sometimes resorted to cheating. Researchers gave the models a seemingly...

Friday Squid Blogging: New Squid Fossil
From Schneier on Security

Friday Squid Blogging: New Squid Fossil

A 450-million-year-old squid fossil was dug up in upstate New York. Blog moderation policy.

Implementing Cryptography in AI Systems
From Schneier on Security

Implementing Cryptography in AI Systems

Interesting research: “How to Securely Implement Cryptography in Deep Neural Networks.” Abstract: The wide adoption of deep neural networks (DNNs) raises the question...

An LLM Trained to Create Backdoors in Code
From Schneier on Security

An LLM Trained to Create Backdoors in Code

Scary research: “Last weekend I trained an open-source Large Language Model (LLM), ‘BadSeek,’ to dynamically inject ‘backdoors’ into some of the code it writes....

Device Code Phishing
From Schneier on Security

Device Code Phishing

This isn’t new, but it’s increasingly popular: The technique is known as device code phishing. It exploits “device code flow,” a form of authentication formalized...

Story About Medical Device Security
From Schneier on Security

Story About Medical Device Security

Ben Rothke relates a story about me working with a medical device firm back when I was with BT. I don’t remember the story at all, or who the company was. But it...

Atlas of Surveillance
From Schneier on Security

Atlas of Surveillance

The EFF has released its Atlas of Surveillance, which documents police surveillance technology across the US.

Friday Squid Blogging: Squid the Care Dog
From Schneier on Security

Friday Squid Blogging: Squid the Care Dog

The Vanderbilt University Medical Center has a pediatric care dog named “Squid.” Blog moderation policy.

Upcoming Speaking Engagements
From Schneier on Security

Upcoming Speaking Engagements

This is a current list of where and when I am scheduled to speak: I’m speaking at Boskone 62 in Boston, Massachusetts, USA, which runs from February 14-16, 2025...

AI and Civil Service Purges
From Schneier on Security

AI and Civil Service Purges

Donald Trump and Elon Musk’s chaotic approach to reform is upending government operations. Critical functions have been halted, tens of thousands of federal staffers...

DOGE as a National Cyberattack
From Schneier on Security

DOGE as a National Cyberattack

In the span of just weeks, the US government has experienced what may be the most consequential security breach in its history—not through a sophisticated cyberattack...

Delivering Malware Through Abandoned Amazon S3 Buckets
From Schneier on Security

Delivering Malware Through Abandoned Amazon S3 Buckets

Here’s a supply-chain attack just waiting to happen. A group of researchers searched for, and then registered, abandoned Amazon S3 buckets for about $400. These...

Trusted Encryption Environments
From Schneier on Security

Trusted Encryption Environments

Really good—and detailed—survey of Trusted Encryption Environments (TEEs.)

Pairwise Authentication of Humans
From Schneier on Security

Pairwise Authentication of Humans

Here’s an easy system for two humans to remotely authenticate to each other, so they can be sure that neither are digital impersonations. To mitigate that risk...

UK is Ordering Apple to Break its Own Encryption
From Schneier on Security

UK is Ordering Apple to Break its Own Encryption

The Washington Post is reporting that the UK government has served Apple with a “technical capability notice” as defined by the 2016 Investigatory Powers Act, requiring...

Friday Squid Blogging: The Colossal Squid
From Schneier on Security

Friday Squid Blogging: The Colossal Squid

Long article on the colossal squid. Blog moderation policy.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account