acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
datePast Week
authorBruce Schneier
bg-corner

Friday Squid Blogging: A New Explanation of Squid Camouflage
From Schneier on Security

Friday Squid Blogging: A New Explanation of Squid Camouflage

New research: An associate professor of chemistry and chemical biology at Northeastern University, Deravi’s recently published paper in the Journal of Materials...

My Writings Are in the LibGen AI Training Corpus
From Schneier on Security

My Writings Are in the LibGen AI Training Corpus

The Atlantic has a search tool that allows you to search for specific works in the “LibGen” database of copyrighted works that Meta used to train its AI models....

NCSC Releases Post-Quantum Cryptography Timeline
From Schneier on Security

NCSC Releases Post-Quantum Cryptography Timeline

The UK’s National Computer Security Center (part of GCHQ) released a timeline—also see their blog post—for migration to quantum-computer-resistant cryptography....

Critical GitHub Attack
From Schneier on Security

Critical GitHub Attack

This is serious: A sophisticated cascading supply chain attack has compromised multiple GitHub Actions, exposing critical CI/CD secrets across tens of thousands...

Is Security Human Factors Research Skewed Towards Western Ideas and Habits?
From Schneier on Security

Is Security Human Factors Research Skewed Towards Western Ideas and Habits?

Really interesting research: “How WEIRD is Usable Privacy and Security Research?” by Ayako A. Hasegawa Daisuke Inoue, and Mitsuaki Akiyama: Abstract: In human...

Improvements in Brute Force Attacks
From Schneier on Security

Improvements in Brute Force Attacks

New paper: “GPU Assisted Brute Force Cryptanalysis of GPRS, GSM, RFID, and TETRA: Brute Force Cryptanalysis of KASUMI, SPECK, and TEA3.” Abstract: Key lengths...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account