acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

The Security Underpinnnings of Cryptography
From Schneier on Security

The Security Underpinnnings of Cryptography

Nice article on some of the security assumptions we rely on in cryptographic algorithms....

New Kryptos Clue
From Schneier on Security

New Kryptos Clue

Jim Sanborn has given he world another clue to the fourth cyphertext in his Kryptos sculpture at the CIA headquarters. Older posts on Kryptos....

Friday Squid Blogging: Cephalopod Cognition
From Schneier on Security

Friday Squid Blogging: Cephalopod Cognition

Tales of cephalopod behavior, including octopuses, squid, cuttlefish and nautiluses. Cephalopod Cognition, published by Cambridge University Press, is currently...

Pre-Snowden Debate About NSA Call-Records Collection Program
From Schneier on Security

Pre-Snowden Debate About NSA Call-Records Collection Program

Reuters is reporting that in 2009, several senior NSA officials objected to the NSA call-records collection program. The now-retired NSA official, a longtime code...

Citadel Malware Steals Password Manager Master Passwords
From Schneier on Security

Citadel Malware Steals Password Manager Master Passwords

Citadel is the first piece of malware I know of that specifically steals master passwords from password managers. Note that my own Password Safe is a target....

A New Free CA
From Schneier on Security

A New Free CA

Announcing Let's Encrypt, a new free certificate authority. This is a joint project of EFF, Mozilla, Cisco, Akamai, and the University of Michigan. This is an absolutely...

Whatsapp Is Now End-to-End Encrypted
From Schneier on Security

Whatsapp Is Now End-to-End Encrypted

Whatapp is now offering end-to-end message encryption: Whatsapp will integrate the open-source software Textsecure, created by privacy-focused non-profit Open Whisper...

Snarky 1992 NSA Report on Academic Cryptography
From Schneier on Security

Snarky 1992 NSA Report on Academic Cryptography

The NSA recently declassified a report on the Eurocrypt '92 conference. Honestly, I share some of the writer's opinions on the more theoretical stuff. I know it's...

The NSA's Efforts to Ban Cryptographic Research in the 1970s
From Schneier on Security

The NSA's Efforts to Ban Cryptographic Research in the 1970s

New article on the NSA's efforts to control academic cryptographic research in the 1970s. It includes new interviews with public-key cryptography inventor Martin...

Friday Squid Blogging: The Story of Inventing the SQUID
From Schneier on Security

Friday Squid Blogging: The Story of Inventing the SQUID

The interesting story of how engineers at Ford Motor Co. invented the superconducting quantum interference device, or SQUID. As usual, you can also use this squid...

The Return of Crypto Export Controls?
From Schneier on Security

The Return of Crypto Export Controls?

Last month, for the first time since US export restrictions on cryptography were relaxed two decades ago, the US government has fined a company for exporting crypto...

Pew Research Survey on Privacy Perceptions
From Schneier on Security

Pew Research Survey on Privacy Perceptions

Pew Research has released a new survey on American's perceptions of privacy. The results are pretty much in line with all the other surveys on privacy I've read...

ISPs Blocking TLS Encryption
From Schneier on Security

ISPs Blocking TLS Encryption

It's not happening often, but it seems that some ISPs are blocking STARTTLS messages and causing web encryption to fail. EFF has the story....

Narrowly Constructing National Surveillance Law
From Schneier on Security

Narrowly Constructing National Surveillance Law

Orin Kerr has a new article that argues for narrowly constructing national security law: This Essay argues that Congress should adopt a rule of narrow construction...

Sophisticated Targeted Attack Via Hotel Networks
From Schneier on Security

Sophisticated Targeted Attack Via Hotel Networks

Kaspersky Labs is reporting (detailed report here, technical details here) on a sophisticated hacker group that is targeting specific individuals around the world...

Hacking Internet Voting from Wireless Routers
From Schneier on Security

Hacking Internet Voting from Wireless Routers

Good paper, and layman's explanation. Internet voting scares me. It gives hackers the potential to seriously disrupt our democratic processes....

The Future of Incident Response
From Schneier on Security

The Future of Incident Response

Security is a combination of protection, detection, and response. It's taken the industry a long time to get to this point, though. The 1990s was the era of protection...

Friday Squid Blogging: Dried Squid Sold in Korean Baseball Stadiums
From Schneier on Security

Friday Squid Blogging: Dried Squid Sold in Korean Baseball Stadiums

I'm not sure why this is news, except that it makes for a startling headline. (Is the New York Times now into clickbait?) It's not as if people are throwing squid...

Co3 Systems Is Hiring
From Schneier on Security

Co3 Systems Is Hiring

My company, Co3 Systems, is hiring both technical and nontechnical positions. If you live in the Boston area, click through and take a look....

Testing for Explosives in the Chicago Subway
From Schneier on Security

Testing for Explosives in the Chicago Subway

Chicago is doing random explosives screenings at random L stops in the Chicago area. Compliance is voluntary: Police made no arrests but one rider refused to submit...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account