acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Hacking Wireless Bicycle Shifters
From Schneier on Security

Hacking Wireless Bicycle Shifters

This is yet another insecure Internet-of-things story, this one about wireless gear shifters for bicycles. These gear shifters are used in big-money professional...

The State of Ransomware
From Schneier on Security

The State of Ransomware

Palo Alto Networks published its semi-annual report on ransomware. From the Executive Summary: Unit 42 monitors ransomware and extortion leak sites closely to...

Friday Squid Blog: The Market for Squid Oil Is Growing
From Schneier on Security

Friday Squid Blog: The Market for Squid Oil Is Growing

How did I not know before now that there was a market for squid oil? The squid oil market has experienced robust growth in recent years, expanding from $4.56 billion...

New Windows IPv6 Zero-Click Vulnerability
From Schneier on Security

New Windows IPv6 Zero-Click Vulnerability

The press is reporting a critical Windows vulnerability affecting IPv6. As Microsoft explained in its Tuesday advisory, unauthenticated attackers can exploit the...

NIST Releases First Post-Quantum Encryption Algorithms
From Schneier on Security

NIST Releases First Post-Quantum Encryption Algorithms

From the Federal Register: After three rounds of evaluation and analysis, NIST selected four algorithms it will standardize as a result of the PQC Standardization...

Texas Sues GM for Collecting Driving Data without Consent
From Schneier on Security

Texas Sues GM for Collecting Driving Data without Consent

Texas is suing General Motors for collecting driver data without consent and then selling it to insurance companies: From CNN: In car models from 2015 and later...

Upcoming Speaking Engagements
From Schneier on Security

Upcoming Speaking Engagements

This is a current list of where and when I am scheduled to speak: I’m speaking at eCrime 2024 in Boston, Massachusetts, USA. The event runs from September 24 through...

On the Voynich Manuscript
From Schneier on Security

On the Voynich Manuscript

Really interesting article on the ancient-manuscript scholars who are applying their techniques to the Voynich Manuscript. No one has been able to understand the...

Taxonomy of Generative AI Misuse
From Schneier on Security

Taxonomy of Generative AI Misuse

Interesting paper: “Generative AI Misuse: A Taxonomy of Tactics and Insights from Real-World Data“: Generative, multimodal artificial intelligence (GenAI) offers...

Friday Squid Blogging: SQUID Is a New Computational Tool for Analyzing Genomic AI
From Schneier on Security

Friday Squid Blogging: SQUID Is a New Computational Tool for Analyzing Genomic AI

Yet another SQUID acronym: SQUID, short for Surrogate Quantitative Interpretability for Deepnets, is a computational tool created by Cold Spring Harbor Laboratory...

People-Search Site Removal Services Largely Ineffective
From Schneier on Security

People-Search Site Removal Services Largely Ineffective

Consumer Reports has a new study of people-search site removal services, concluding that they don’t really work: As a whole, people-search removal services are...

A Better Investigatory Board for Cyber Incidents
From Schneier on Security

A Better Investigatory Board for Cyber Incidents

When an airplane crashes, impartial investigatory bodies leap into action, empowered by law to unearth what happened and why. But there is no such empowered and...

New Patent Application for Car-to-Car Surveillance
From Schneier on Security

New Patent Application for Car-to-Car Surveillance

Ford has a new patent application for a system where cars monitor each other’s speeds, and then report then to some central authority. Slashdot thread.

Friday Squid Blogging: Treating Squid Parasites
From Schneier on Security

Friday Squid Blogging: Treating Squid Parasites

A newly discovered parasite that attacks squid eggs has been treated. Blog moderation policy.

Leaked GitHub Python Token
From Schneier on Security

Leaked GitHub Python Token

Here’s a disaster that didn’t happen: Cybersecurity researchers from JFrog recently discovered a GitHub Personal Access Token in a public Docker container hosted...

Education in Secure Software Development
From Schneier on Security

Education in Secure Software Development

The Linux Foundation and OpenSSF released a report on the state of education in secure software development. …many developers lack the essential knowledge and skills...

Nearly 7% of Internet Traffic Is Malicious
From Schneier on Security

Nearly 7% of Internet Traffic Is Malicious

Cloudflare reports on the state of applications security. It claims that 6.8% of Internet traffic is malicious. And that CVEs are exploited as quickly as 22 minutes...

Providing Security Updates to Automobile Software
From Schneier on Security

Providing Security Updates to Automobile Software

Auto manufacturers are just starting to realize the problems of supporting the software in older models: Today’s phones are able to receive updates six to eight...

New Research in Detecting AI-Generated Videos
From Schneier on Security

New Research in Detecting AI-Generated Videos

The latest in what will be a continuing arms race between creating and detecting videos: The new tool the research project is unleashing on deepfakes, called “MISLnet...

Friday Squid Blogging: Sunscreen from Squid Pigments
From Schneier on Security

Friday Squid Blogging: Sunscreen from Squid Pigments

They’re better for the environment. Blog moderation policy.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account