acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Friday Squid Blogging: Shower Squid
From Schneier on Security

Friday Squid Blogging: Shower Squid

Neat.

34 SCADA Vulnerabilities Published
From Schneier on Security

34 SCADA Vulnerabilities Published

It's hard to tell how serious this is. Computer security experts who examined the code say the vulnerabilities are not highly dangerous on their own, because they...

Comodo Group Issues Bogus SSL Certificates
From Schneier on Security

Comodo Group Issues Bogus SSL Certificates

This isn't good: The hacker, whose March 15 attack was traced to an IP address in Iran, compromised a partner account at the respected certificate authority Comodo...

FBI Asks for Cryptanalysis Help
From Schneier on Security

FBI Asks for Cryptanalysis Help

Could be interesting.

How Peer Review Doesn't Work
From Schneier on Security

How Peer Review Doesn't Work

In this amusing story of a terrorist plotter using pencil-and-paper cryptography instead of actually secure cryptography, there's this great paragraph: Despite...

Federated Authentication
From Schneier on Security

Federated Authentication

New paper by Ross Anderson: "Can We Fix the Security Economics of Federated Authentication?": There has been much academic discussion of federated authentication...

Detecting Liars
From Schneier on Security

Detecting Liars

Nice infographic.

Biliteral Ciphers
From Schneier on Security

Biliteral Ciphers

Interesting article on William Friedman and biliteral ciphers.

Friday Squid Blogging: Squid Fabric Designs
From Schneier on Security

Friday Squid Blogging: Squid Fabric Designs

Some of these are actually nice.

Authenticating the Authenticators
From Schneier on Security

Authenticating the Authenticators

This is an interesting read: It was a question that changed his life, and changed mine, and may have changed -- even saved -- all of ours by calling attention...

Identifying Tor Users Through Insecure Applications
From Schneier on Security

Identifying Tor Users Through Insecure Applications

Interesting research: "One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users": Abstract: Tor is a popular low-latency anonymity...

Detecting Words and Phrases in Encrypted VoIP Calls
From Schneier on Security

Detecting Words and Phrases in Encrypted VoIP Calls

Interesting: Abstract: Although Voice over IP (VoIP) is rapidly being adopted, its security implications are not yet fully understood. Since VoIP calls may traverse...

Transmitting Data Through Steel
From Schneier on Security

Transmitting Data Through Steel

This is cool: Tristan Lawry, doctoral candidate in electrical and computer engineering, has developed equipment which can transmit data at high rates through thick...

Threats vs. Vulnerabilities
From Schneier on Security

Threats vs. Vulnerabilities

I found this article on the difference between threats and vulnerabilities to be very interesting. I like his taxonomy.

Folk Models in Home Computer Security
From Schneier on Security

Folk Models in Home Computer Security

This is a really interesting paper: "Folk Models of Home Computer Security," by Rick Wash. It was presented at SOUPS, the Symposium on Usable Privacy and Security...

Times Square Video Screen Hacked with an iPhone
From Schneier on Security

Times Square Video Screen Hacked with an iPhone

I didn't post about it when I first saw it because I suspected a hoax. Turns out, I was right. It wasn't even two guys faking hacking a Times Square video screen...

RSA Security, Inc Hacked
From Schneier on Security

RSA Security, Inc Hacked

The company, not the algorithm. Here's the corporate spin. Our investigation has led us to believe that the attack is in the category of an Advanced Persistent...

Zombie Fungus
From Schneier on Security

Zombie Fungus

The security connection is pretty tenuous, so I figured I'd blog this on a Saturday. Once it infects an ant, the fungus uses as-yet-unidentified chemicals to control...

Hacking ATM Users by Gluing Down Keys
From Schneier on Security

Hacking ATM Users by Gluing Down Keys

Clever hack: The thieves glue down the "enter," "cancel" and "clear" buttons on the keypad and wait until the customer goes into the bank for help before withdrawing...

Hacking Cars with MP3 Files
From Schneier on Security

Hacking Cars with MP3 Files

Impressive research: By adding extra code to a digital music file, they were able to turn a song burned to CD into a Trojan horse. When played on the car's stereo...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account