acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

"Ask Nicely" Doesn't Work as a Security Mechanism
From Schneier on Security

"Ask Nicely" Doesn't Work as a Security Mechanism

Apple's map application shows more of Taiwan than Google Maps: The Taiwanese government/military, like many others around the world, requests that satellite imagery...

The Insecurity of Networks
From Schneier on Security

The Insecurity of Networks

Not computer networks, networks in general: Findings so far suggest that networks of networks pose risks of catastrophic danger that can exceed the risks in isolated...

Story of a CIA Burglar
From Schneier on Security

Story of a CIA Burglar

This is a fascinating story of a CIA burglar, who worked for the CIA until he tried to work against the CIA. The fact that he stole code books and keys from foreign...

New Developments in Captchas
From Schneier on Security

New Developments in Captchas

In the never-ending arms race between systems to prove that you're a human and computers that can fake it, here's a captcha that tests whether you have human feelings...

Friday Squid Blogging: Giant Squid Engraving from the 1870s
From Schneier on Security

Friday Squid Blogging: Giant Squid Engraving from the 1870s

Neat book illustration. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

When Will We See Collisions for SHA-1?
From Schneier on Security

When Will We See Collisions for SHA-1?

On a NIST-sponsored hash function mailing list, Jesse Walker (from Intel; also a member of the Skein team) did some back-of-the-envelope calculations to estimate...

Maps Showing Spread of ZeroAccess Botnet
From Schneier on Security

Maps Showing Spread of ZeroAccess Botnet

The folks at F-Secure have plotted ZeroAccess infections across the U.S. and across Europe. It's interesting to see, but I'm curious to see the data normalized...

Tradecraft and Terrorism
From Schneier on Security

Tradecraft and Terrorism

Interesting.

Authentication Stories
From Schneier on Security

Authentication Stories

Anecdotes from Asia on seals versus signatures on official documents.

Keccak is SHA-3
From Schneier on Security

Keccak is SHA-3

NIST has just announced that Keccak has been selected as SHA-3. It's a fine choice. I'm glad that SHA-3 is nothing like the SHA-2 family; something completely...

2013 U.S. Homeland Security Budget
From Schneier on Security

2013 U.S. Homeland Security Budget

Among other findings in this CBO report: Funding for homeland security has dropped somewhat from its 2009 peak of $76 billion, in inflation-adjusted terms; funding...

Security Question Cartoon
From Schneier on Security

Security Question Cartoon

Funny.

Scary iPhone Malware Story
From Schneier on Security

Scary iPhone Malware Story

This story sounds pretty scary: Developed by Robert Templeman at the Naval Surface Warfare Center in Indiana and a few buddies from Indiana University, PlaceRader...

NPR on Biometric Data Collection
From Schneier on Security

NPR on Biometric Data Collection

Interesting Talk of the Nation segment.

Replacing Alice and Bob
From Schneier on Security

Replacing Alice and Bob

A proposal to replace cryptography's Alice and Bob with Sita and Rama: Any book on cryptography invariably involves the characters Alice and Bob. It is always...

Using Agent-Based Simulations to Evaluate Security Systems
From Schneier on Security

Using Agent-Based Simulations to Evaluate Security Systems

Kay Hamacher and Stefan Katzenbeisser, "Public Security: Simulations Need to Replace Conventional Wisdom," New Security Paradigms Workshop, 2011. Abstract: Is...

Quantum Cryptography
From Schneier on Security

Quantum Cryptography

Long article on quantum cryptography and cryptanalysis.

Homomorphic Encryption
From Schneier on Security

Homomorphic Encryption

Good summary article.

Security Vulnerability in Windows 8 Unified Extensible Firmware Interface (UEFI)
From Schneier on Security

Security Vulnerability in Windows 8 Unified Extensible Firmware Interface (UEFI)

This is the first one discovered, I think.

SHA-3 to Be Announced
From Schneier on Security

SHA-3 to Be Announced

NIST is about to announce the new hash algorithm that will become SHA-3. This is the result of a six-year competition, and my own Skein is one of the five remaining...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account