acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Subpoenas as a Security Threat
From Schneier on Security

Subpoenas as a Security Threat

Blog post from Ed Felten: Usually when the threat model mentions subpoenas, the bigger threats in reality come from malicious intruders or insiders. The biggest...

"The Cult of Schneier"
From Schneier on Security

"The Cult of Schneier"

If there's actually a cult out there, I want to hear about it. In an essay by that name, John Viega writes about the dangers of relying on Applied Cryptography...

Real-World Access Control
From Schneier on Security

Real-World Access Control

Access control is difficult in an organizational setting. On one hand, every employee needs enough access to do his job. On the other hand, every time you giverole...

The History of One-Time Pads and the Origins of SIGABA
From Schneier on Security

The History of One-Time Pads and the Origins of SIGABA

Blog post from Steve Bellovin: It is vital that the keystream values (a) be truly random and (b) never be reused. The Soviets got that wrong in the 1940s; as a...

The Exaggerated Fears of Cyber-War
From Schneier on Security

The Exaggerated Fears of Cyber-War

Good article, which basically says that our policies are based more on fear than on reality. On cyber-terrorism: So why is there so much concern about

Hacking Swine Flu
From Schneier on Security

Hacking Swine Flu

Interesting: So how many bits are in this instance of H1N1? The raw number of bits, by my count, is 26,022; the actual number of coding bits approximately 25,054...

Matthew Weigman
From Schneier on Security

Matthew Weigman

Fascinating story of a 16-year-old blind phone phreaker. One afternoon, not long after Proulx was swatted, Weigman came home to find his mother talking to what...

On London's Surveillance Cameras
From Schneier on Security

On London's Surveillance Cameras

A recent report has concluded that the London's surveillance cameras have solved one crime per thousand cameras per year. David Davis MP, the former shadow home...

Friday Squid Blogging: Squid Police
From Schneier on Security

Friday Squid Blogging: Squid Police

I like to think this isn't a typo.

The Security Risks of Accepting Free Laptops
From Schneier on Security

The Security Risks of Accepting Free Laptops

Weird: The U.S. Federal Bureau of Investigation is trying to figure out who is sending laptop computers to state governors across the U.S., including West Virginia...

Marine Worms with Glowing Bombs
From Schneier on Security

Marine Worms with Glowing Bombs

More security stories from the natural world: During chase scenes, movie protagonists often make their getaway by releasing some sort of decoy to cover their escape...

Banning Beer Glasses in Pubs
From Schneier on Security

Banning Beer Glasses in Pubs

Not beer, just the glasses: The Home Office has commissioned a new design, in an attempt to stop glasses being used as weapons. Official figures show 5,500 people...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account