acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Eben Moglen and I Talk about the NSA
From Schneier on Security

Eben Moglen and I Talk about the NSA

Last week, Eben Moglen and I had a conversation about NSA surveillance. Audio and video are online.

Acoustic Cryptanalysis
From Schneier on Security

Acoustic Cryptanalysis

This is neat: Here, we describe a new acoustic cryptanalysis key extraction attack, applicable to GnuPG's current implementation of RSA. The attack can extract...

Tor User Identified by FBI
From Schneier on Security

Tor User Identified by FBI

Eldo Kim sent an e-mail bomb threat to Harvard so he could skip a final exam. (It's just a coincidence that I was on the Harvard campus that day.) Even though...

Security Vulnerabilities of Legacy Code
From Schneier on Security

Security Vulnerabilities of Legacy Code

An interesting research paper documents a "honeymoon effect" when it comes to software and vulnerabilities: attackers are more likely to find vulnerabilities in...

Attacking Online Poker Players
From Schneier on Security

Attacking Online Poker Players

This story is about how at least two professional online poker players had their hotel rooms broken into and their computers infected with malware. I agree with...

Friday Squid Blogging: Squid Bow Tie
From Schneier on Security

Friday Squid Blogging: Squid Bow Tie

Snappy-looking bow tie. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

President Obama and the Intelligence Community
From Schneier on Security

President Obama and the Intelligence Community

Really good article from the New Yorker.

World War II Anecdote about Trust and Security
From Schneier on Security

World War II Anecdote about Trust and Security

This is an interesting story from World War II about trust: Jones notes that the Germans doubted their system because they knew the British could radio false orders...

How the NSA Tracks Mobile Phone Data
From Schneier on Security

How the NSA Tracks Mobile Phone Data

Last week the Washington Post reported on how the NSA tracks mobile phones world-wide, and this week they followed up with source documents and more detail. Barton...

NSA Tracks People Using Google Cookies
From Schneier on Security

NSA Tracks People Using Google Cookies

The Washington Post has a detailed article on how the NSA uses cookie data to track individuals. The EFF also has a good post on this. I have been writing and...

NSA Spying on Online Gaming Worlds
From Schneier on Security

NSA Spying on Online Gaming Worlds

The NSA is spying on chats in World of Warcraft and other games. There's lots of information -- and a good source document. While it's fun to joke about the NSA...

Bitcoin Explanation
From Schneier on Security

Bitcoin Explanation

This is the best explanation of the Bitcoin protocol that I have read.

Friday Squid Blogging: Hoax Squid-Like Creature
From Schneier on Security

Friday Squid Blogging: Hoax Squid-Like Creature

The weird squid-like creature floating around Bristol Harbour is a hoax. As usual, you can also use this squid post to talk about the security stories in the news...

New Book: <i>Carry On</i>
From Schneier on Security

New Book: Carry On

I have a new book. It's Carry On: Sound Advice from Schneier on Security, and it's my second collection of essays. This book covers my writings from March 2008...

Bruce Schneier Facts T-Shirts
From Schneier on Security

Bruce Schneier Facts T-Shirts

0-Day Clothing has taken 25 Bruce Schneier Facts and turned them into T-shirts just in time for Christmas.

Telepathwords: A New Password Strength Estimator
From Schneier on Security

Telepathwords: A New Password Strength Estimator

Telepathwords is a pretty clever research project that tries to evaluate password strength. It's different from normal strength meters, and I think better. Telepathwords...

Heartwave Biometric
From Schneier on Security

Heartwave Biometric

Here's a new biometric I know nothing about: The wristband relies on authenticating identity by matching the overall shape of the user's heartwave (captured via...

The Problem with EULAs
From Schneier on Security

The Problem with EULAs

Some apps are being distributed with secret Bitcoin-mining software embedded in them. Coins found are sent back to the app owners, of course. And to make it legal...

Evading Airport Security
From Schneier on Security

Evading Airport Security

The news is reporting about Evan Booth, who builds weaponry out of items you can buy after airport security. It's clever stuff. It's not new, though. Peopleexplained...

Keeping Track of All the Snowden Documents
From Schneier on Security

Keeping Track of All the Snowden Documents

As more and more media outlets from all over the world continue to report on the Snowden documents, it's harder and harder to keep track of what has been released...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account