acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Book on GCHQ
From Schneier on Security

Book on GCHQ

A book on GCHQ, and two reviews.

EU Counterterrorism Strategy
From Schneier on Security

EU Counterterrorism Strategy

Interesting journal article evaluating the EU's counterterrorism efforts.

Economic Considerations of Website Password Policies
From Schneier on Security

Economic Considerations of Website Password Policies

Two interesting research papers on website password policies. "Where Do Security Policies Come From?": Abstract: We examine the password policies of 75 different...

New GAO Cybersecurity Report
From Schneier on Security

New GAO Cybersecurity Report

From the U.S. Government Accountability Office: "Cybersecurity: Key Challenges Need to Be Addressed to Improve Research and Development." Thirty-six pages; I haven't...

Violating Terms of Service Possibly a Crime
From Schneier on Security

Violating Terms of Service Possibly a Crime

From Wired News: The four Wiseguy defendants, who also operated other ticket-reselling businesses, allegedly used sophisticated programming and inside information...

Embedded Code in U.S. Cyber Command Logo
From Schneier on Security

Embedded Code in U.S. Cyber Command Logo

This is excellent. And it's been cracked already.

Friday Squid Blogging: Hawaiian Bobtail Squid
From Schneier on Security

Friday Squid Blogging: Hawaiian Bobtail Squid

Symbiotic relationship between the Hawaiian bobtail squid and bioluminescent bacteria, with bonus security implications.

Skype's Cryptography Reverse-Engineered
From Schneier on Security

Skype's Cryptography Reverse-Engineered

Someone claims to have reverse-engineered Skype's proprietary encryption protocols, and has published pieces of it. If the crypto is good, this is less of a big...

The NSA's Perfect Citizen
From Schneier on Security

The NSA's Perfect Citizen

In what creepy back room do they come up with these names? The federal government is launching an expansive program dubbed "Perfect Citizen" to detect cyber assaults...

Russian Intelligence Gets Source Code to Windows 7
From Schneier on Security

Russian Intelligence Gets Source Code to Windows 7

I don't think this is a good idea.

Random Numbers from Quantum Noise
From Schneier on Security

Random Numbers from Quantum Noise

Not that we need more ways to get random numbers, but the research is interesting.

Burglary Detection through Video Analytics
From Schneier on Security

Burglary Detection through Video Analytics

This is interesting: Some of the scenarios where we have installed video analytics for our clients include: to detect someone walking in an area of their yard...

Caller ID Spoofing on the Android
From Schneier on Security

Caller ID Spoofing on the Android

It's easy to access someone else's voicemail by spoofing the caller ID. This isn't new; what is new is that many people now have easy access to caller ID spoofing...

Hemingway Authentication Scheme
From Schneier on Security

Hemingway Authentication Scheme

From 1955, intended as humor: In the future when I should ever call on the telephone to make a request or issue an order I will identify myself as follows: This...

The Chaocipher
From Schneier on Security

The Chaocipher

The Chaocipher is a mechanical encryption algorithm invented in 1918. No one was able to reverse-engineer the algorithm, given sets of plaintexts and ciphertexts...

Serial Killers Are Now Terrorists
From Schneier on Security

Serial Killers Are Now Terrorists

Try to keep up: Leslie Van Houten, a one-time member of Charles Manson's infamous 'family' is up for parole for the 17th time today.... "These are serial killers...

Internet Kill Switch
From Schneier on Security

Internet Kill Switch

Last month, Sen. Joe Lieberman, I-Conn., introduced a bill that might -- we're not really sure -- give the president the authority to shut down all or portionsproposed...

Friday Squid Blogging: Squid Sex Organs
From Schneier on Security

Friday Squid Blogging: Squid Sex Organs

Riddles of squid sex: All cephalopods are hindered by their body shape, which comprises a closed hood-type structure called a mantle, which forms most of what...

TSA Blocks Access to Websites with "Controversial Opinions"
From Schneier on Security

TSA Blocks Access to Websites with "Controversial Opinions"

I wonder if my blog counts.

Detecting Cheating at Colleges
From Schneier on Security

Detecting Cheating at Colleges

The measures used to prevent cheating during tests remind me of casino security measures: No gum is allowed during an exam: chewing could disguise a student
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account