acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Thieves Use Video Camera to Stake Out Properties
From Schneier on Security

Thieves Use Video Camera to Stake Out Properties

If the police can use cameras, so can the burglars.

Security Externalities and DDOS Attacks
From Schneier on Security

Security Externalities and DDOS Attacks

Ed Felten has a really good blog post about the externalities that the recent Spamhaus DDOS attack exploited: The attackers' goal was to flood Spamhaus or itswriting...

Last Battle of Midway Cryptanalyst
From Schneier on Security

Last Battle of Midway Cryptanalyst

The last cryptanalyst at the Battle of Midway, Rear Admiral Donald "Mac" Showers, USN-Ret, passed away 19 October 2012. His interment at Arlington National Cemetery...

Nice Security Mindset Example
From Schneier on Security

Nice Security Mindset Example

A real-world one-way function: Alice and Bob procure the same edition of the white pages book for a particular town, say Cambridge. For each letter Alice wants...

Bitcoins in the Mainstream Media
From Schneier on Security

Bitcoins in the Mainstream Media

Interesting article from the New Yorker. I'm often asked what I think about bitcoins. I haven't analyzed the security, but what I have seen looks good. The real...

Elite Panic
From Schneier on Security

Elite Panic

I hadn't heard of this term before, but it's an interesting one. The excerpt below is from an interview with Rebecca Solnit, author of A Paradise Built in Hell...

Government Use of Hackers as an Object of Fear
From Schneier on Security

Government Use of Hackers as an Object of Fear

Interesting article about the perception of hackers in popular culture, and how the government uses the general fear of them to push for more power: But theseoverzealous...

Friday Squid Blogging: Nighttime Squid Fishing Seen from Space
From Schneier on Security

Friday Squid Blogging: Nighttime Squid Fishing Seen from Space

Page 18 of this thesis explains that squid fishing is done at night, and the lighting is so bright shows up in the satellite surveys of planetary lighting. This...

Apple's iMessage Encryption Seems to Be Pretty Good
From Schneier on Security

Apple's iMessage Encryption Seems to Be Pretty Good

The U.S. Drug Enforcement Agency has complained (in a classified report, not publicly) that Apple's iMessage end-to-end encryption scheme can't be broken. On the...

Skein Collision Competition
From Schneier on Security

Skein Collision Competition

Xkcd had a Skein collision competition. The contest is over -- Carnegie Mellon University won, with 384 (out of 1024) mismatched bits -- but it's explained here...

NSA Crossword Puzzles
From Schneier on Security

NSA Crossword Puzzles

Two puzzles from a 1977 issue of Cryptolog.

IT for Oppression
From Schneier on Security

IT for Oppression

Whether it's Syria using Facebook to help identify and arrest dissidents or China using its "Great Firewall" to limit access to international news throughout the...

Narratives of Secrecy
From Schneier on Security

Narratives of Secrecy

How people talked about the secrecy surrounding the Manhattan project.

Sixth Movie-Plot Threat Contest
From Schneier on Security

Sixth Movie-Plot Threat Contest

It's back, after a two-year hiatus. Terrorism is boring; cyberwar is in. Cyberwar, and its kin: cyber Pearl Harbor, cyber 9/11, cyber Armageddon. (Or make up...

What I've Been Thinking About
From Schneier on Security

What I've Been Thinking About

I'm starting to think about my next book, which will be about power and the Internet -- from the perspective of security. My objective will be to describe current...

Friday Squid Blogging: Bomb Discovered in Squid at Market
From Schneier on Security

Friday Squid Blogging: Bomb Discovered in Squid at Market

Really: An unexploded bomb was found inside a squid when the fish was slaughtered at a fish market in Guangdong province. Oddly enough, this doesn't seem to be...

The Dangers of Surveillance
From Schneier on Security

The Dangers of Surveillance

Interesting article, "The Dangers of Surveillance," by Neil M. Richards, Harvard Law Review, 2013. From the abstract: ....We need a better account of the dangers...

New RC4 Attack
From Schneier on Security

New RC4 Attack

This is a really clever attack on the RC4 encryption algorithm as used in TLS. We have found a new attack against TLS that allows an attacker to recover a limited...

Unwitting Drug Smugglers
From Schneier on Security

Unwitting Drug Smugglers

This is a story about a physicist who got taken in by an imaginary Internet girlfriend and ended up being arrested in Argentina for drug smuggling. Readers of...

Security Awareness Training
From Schneier on Security

Security Awareness Training

Should companies spend money on security awareness training for their employees? It's a contentious topic, with respected experts on both sides of the debate.right...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account