acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

NIST is Continuing to Work on Post-Quantum-Computing Cryptography Standards
From Schneier on Security

NIST is Continuing to Work on Post-Quantum-Computing Cryptography Standards

NIST is accepting proposals for public-key algorithms immune to quantum computing techniques. Details here. Deadline is the end of November 2017. I applaud NIST...

The Future of Faking Audio and Video
From Schneier on Security

The Future of Faking Audio and Video

This Verge article isn't great, but we are certainly moving into a future where audio and video will be easy to fake, and easier to fake undetectably. This is going...

The Pro-PGP Position
From Schneier on Security

The Pro-PGP Position

A few days ago I blogged an excellent essay by Filippo Valsorda on why he's giving up on PGP. Neal Walkfield wrote a good rebuttal. I am on Valsorda's side. I don't...

Encryption Working Group Annual Report from the US House of Representatives
From Schneier on Security

Encryption Working Group Annual Report from the US House of Representatives

The Encryption Working Group of the House Judiciary Committee and the House Energy and Commerce Committee has released its annual report. Observation #1: Any measure...

Google Releases Crypto Test Suite
From Schneier on Security

Google Releases Crypto Test Suite

Google has released Project Wycheproof a test suite designed to test cryptographic libraries against a series of known attacks. From a blog post: In cryptography...

Smartphone Spying as Art
From Schneier on Security

Smartphone Spying as Art

A film student put spyware on a smartphone and then allowed it to be stolen. He made a movie of the results....

UN Considering Killer Robot Ban
From Schneier on Security

UN Considering Killer Robot Ban

This would be a good idea, although I can't imagine countries like the US, China, and Russia going along with it -- at least not right now....

Friday Squid Blogging: Woman Throws Squid at Her Boyfriend
From Schneier on Security

Friday Squid Blogging: Woman Throws Squid at Her Boyfriend

This is what passes for news these days. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Giving Up on PGP
From Schneier on Security

Giving Up on PGP

Filippo Valsorda wrote an exellent essay on why he's giving up on PGP. I have long believed PGP to be more trouble than it is worth. It's hard to use correctly,...

Impressive Social Engineering Display
From Schneier on Security

Impressive Social Engineering Display

In this impressive lc7scxvKQOo">social-engineering display, a hacker convinces a cell phone tech-support person to change an account password without being verified...

My Priorities for the Next Four Years
From Schneier on Security

My Priorities for the Next Four Years

Like many, I was surprised and shocked by the election of Donald Trump as president. I believe his ideas, temperament, and inexperience represent a grave threat...

Let's Encrypt Is Making Web Encryption Easier
From Schneier on Security

Let's Encrypt Is Making Web Encryption Easier

That's the conclusion of a research paper: Once [costs and complexity] are eliminated, it enables big hosting providers to issue and deploy certificates for their...

Hiding Information in Silver and Carbon Ink
From Schneier on Security

Hiding Information in Silver and Carbon Ink

Interesting: "We used silver and carbon ink to print an image consisting of small rods that are about a millimeter long and a couple of hundred microns wide," said...

Ransomware Meets Multi-level Marketing
From Schneier on Security

Ransomware Meets Multi-level Marketing

A new ransomware, Popcorn Time, gives users the option of infecting others in lieu of paying the ransom. Related: a good general article on ransomware....

Cybersecurity Fantasy Role-Playing Game
From Schneier on Security

Cybersecurity Fantasy Role-Playing Game

It's called Cryptomancer. Think computer hacking plus magic. I know nothing about it, but it feels reminiscent of Shadowrun. Reddit thread. RPG.net thread....

Friday Squid Blogging:  Electronic Screens Inspired by Squid
From Schneier on Security

Friday Squid Blogging: Electronic Screens Inspired by Squid

Squid-inspired electronic screens. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Enigma Machine Sold for Almost Half a Million Dollars
From Schneier on Security

Enigma Machine Sold for Almost Half a Million Dollars

A fully functional four-rotor Enigma machine sold for $463,500. Wow....

New NSA Stories
From Schneier on Security

New NSA Stories

Le Monde and the Intercept are reporting about NSA spying in Africa, and NSA spying on in-flight mobile phone calls -- both from the Snowden documents....

WWW Malware Hides in Images
From Schneier on Security

WWW Malware Hides in Images

There's new malware toolkit that uses stegaography to hide in images: For the past two months, a new exploit kit has been serving malicious code hidden in the pixels...

International Phone Fraud Tactics
From Schneier on Security

International Phone Fraud Tactics

This article outlines two different types of international phone fraud. The first can happen when you call an expensive country like Cuba: My phone call never actually...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account