acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
datePast Year
authorschneier
bg-corner

Signal Blocks Windows Recall
From Schneier on Security

Signal Blocks Windows Recall

This article gives a good rundown of the security risks of Windows Recall, and the repurposed copyright protection took that Signal used to block the AI feature...

The Voter Experience
From Schneier on Security

The Voter Experience

Technology and innovation have transformed every part of society, including our electoral experiences. Campaigns are spending and doing more than at any other time...

More AIs Are Taking  Polls and Surveys
From Schneier on Security

More AIs Are Taking Polls and Surveys

I already knew about the declining response rate for polls and surveys. The percentage of AI bots that respond to surveys is also increasing. Solutions are hard...

DoorDash Hack
From Schneier on Security

DoorDash Hack

A DoorDash driver stole over $2.5 million over several months: The driver, Sayee Chaitainya Reddy Devagiri, placed expensive orders from a fraudulent customer account...

Friday Squid Blogging: Pet Squid Simulation
From Schneier on Security

Friday Squid Blogging: Pet Squid Simulation

From Hackaday.com, this is a neural network simulation of a pet squid. Autonomous Behavior: The squid moves autonomously, making decisions based on his current...

Communications Backdoor in Chinese Power Inverters
From Schneier on Security

Communications Backdoor in Chinese Power Inverters

This is a weird story: U.S. energy officials are reassessing the risk posed by Chinese-made devices that play a critical role in renewable energy infrastructure...

AI-Generated Law
From Schneier on Security

AI-Generated Law

On April 14, Dubai’s ruler, Sheikh Mohammed bin Rashid Al Maktoum, announced that the United Arab Emirates would begin using artificial intelligence to help write...

Upcoming Speaking Engagements
From Schneier on Security

Upcoming Speaking Engagements

This is a current list of where and when I am scheduled to speak: I’m speaking (remotely) at the Sektor 3.0 Festival in Warsaw, Poland, May 21-22, 2025. The list...

Court Rules Against NSO Group
From Schneier on Security

Court Rules Against NSO Group

The case is over: A jury has awarded WhatsApp $167 million in punitive damages in a case the company brought against Israel-based NSO Group for exploiting a software...

Florida Backdoor Bill Fails
From Schneier on Security

Florida Backdoor Bill Fails

A Florida bill requiring encryption backdoors failed to pass.

Friday Squid Blogging: Japanese Divers Video Giant Squid
From Schneier on Security

Friday Squid Blogging: Japanese Divers Video Giant Squid

The video is really amazing. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.

Chinese AI Submersible
From Schneier on Security

Chinese AI Submersible

A Chinese company has developed an AI-piloted submersible that can reach speeds “similar to a destroyer or a US Navy torpedo,” dive “up to 60 metres underwater,...

Fake Student Fraud in Community Colleges
From Schneier on Security

Fake Student Fraud in Community Colleges

Reporting on the rise of fake students enrolling in community college courses: The bots’ goal is to bilk state and federal financial aid money by enrolling in classes...

Another Move in the Deepfake Creation/Detection Arms Race
From Schneier on Security

Another Move in the Deepfake Creation/Detection Arms Race

Deepfakes are now mimicking heartbeats In a nutshell Recent research reveals that high-quality deepfakes unintentionally retain the heartbeat patterns from their...

Friday Squid Blogging: Pyjama Squid
From Schneier on Security

Friday Squid Blogging: Pyjama Squid

The small pyjama squid (Sepioloidea lineolata) produces toxic slime, “a rare example of a poisonous predatory mollusc.” As usual, you can also use this squid post...

Privacy for Agentic AI
From Schneier on Security

Privacy for Agentic AI

Sooner or later, it’s going to happen. AI systems will start acting as agents, doing things on our behalf with some degree of autonomy. I think it’s worth thinking...

NCSC Guidance on “Advanced Cryptography”
From Schneier on Security

NCSC Guidance on “Advanced Cryptography”

The UK’s National Cyber Security Centre just released its white paper on “Advanced Cryptography,” which it defines as “cryptographic techniques for processing encrypted...

US as a Surveillance State
From Schneier on Security

US as a Surveillance State

Two essays were just published on DOGE’s data collection and aggregation, and how it ends with a modern surveillance state. It’s good to see this finally being...

WhatsApp Case Against NSO Group Progressing
From Schneier on Security

WhatsApp Case Against NSO Group Progressing

Meta is suing NSO Group, basically claiming that the latter hacks WhatsApp and not just WhatsApp users. We have a procedural ruling: Under the order, NSO Group...

Applying Security Engineering to Prompt Injection Security
From Schneier on Security

Applying Security Engineering to Prompt Injection Security

This seems like an important advance in LLM security against prompt injection: Google DeepMind has unveiled CaMeL (CApabilities for MachinE Learning), a new approach...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account