Posts tagged Computer Security
Schneier on Security - "Crypto-Gram" Newsletter

“I've been writing about security issues on my blog since 2004, and in my monthly newsletter since 1998. I write books, articles, and academic papers. Currently, I'm the Chief Technology Officer of IBM Resilient, a fellow at Harvard's Berkman Center, and a board member of EFF.”
— Bruce Schneier

Perhaps the most interesting and salient item here is the Crypto-Gram Newsletter, “a free monthly newsletter providing summaries, analyses, insights, and commentaries on security: computer and otherwise.“

Read More
How to Update All Your Gear (For Safety!)

Wired.com, Mar. 13, 2017
By Brian Barrett

“This week’s WikiLeaks revelations, which showed that the CIA can compromise a huge range of devices, shouldn’t send you into paroxysms of fear over your smartphone. It should, though, be a solid reminder that one of the best ways to keep yourself safe from hackers is also one of the simplest: Update your gear.“

Read More
Dawn of the Code War

“The inside story of how America’s enemies launched a cyber war against us-and how we’ve learned to fight back...”

Includes links to:

  • “The Lawfare Podcast: John Carlin on 'Dawn of the Code War'“ by Jen Patja Howell. Saturday, November 24, 2018.

  • A discussion on responses to national security threats in cyberspace from the Department of Justice, featuring John P. Carlin, Former Assistant Attorney General, National Security Division; and John C. Demers, Assistant Attorney General, National Security Division, on Tuesday, January 15, 2019 at the Center for Strategic & International Studies.

  • John Carlin on “Stay Tuned with Preet” Dec. 4, 2018.

Read More
Secrets & Lies: Digital Security in a Networked World

Welcome to the businessworld.com. It's digital: Information is more readily accessible than ever. It's inescapably connected: businesses are increasingly--if not totally--dependent on digital communications. But our passion for technology has a price: increased exposure to security threats. Companies around the world need to understand the risks associated with doing business electronically. The answer starts here.

Read More
Applied Cryptography: Protocols, Algorithms, and Source Code in C

This second edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography -- the technique of enciphering and deciphering messages -- to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them in cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems.

Read More