acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Naming Pets
From Schneier on Security

Naming Pets

Children are being warned that the name of their first pet should contain at least eight characters and a digit.

So You Want to Be a Security Expert
From Schneier on Security

So You Want to Be a Security Expert

I regularly receive e-mail from people who want advice on how to learn more about computer security, either as a course of study in college or as an IT person considering...

Commercial Espionage Virus
From Schneier on Security

Commercial Espionage Virus

It's designed to steal blueprints and send them to China. Note that although this is circumstantial evidence that the virus is from China, it is possible that...

On Fear
From Schneier on Security

On Fear

A poet reflects on the nature of fear.

WEIS 2012
From Schneier on Security

WEIS 2012

Last week I was at the Workshop on Economics and Information Security in Berlin. Excellent conference, as always. Ross Anderson liveblogged the event; see the...

Friday Squid Blogging: Another Giant Squid Found
From Schneier on Security

Friday Squid Blogging: Another Giant Squid Found

A dead 13-foot-long giant squid has been found off the coast of New South Wales. As usual, you can also use this squid post to talk about the security stories...

FireDogLake Book Salon for <i>Liars and Outliers</i>
From Schneier on Security

FireDogLake Book Salon for Liars and Outliers

Here's the permalink.

On Securing Potentially Dangerous Virology Research
From Schneier on Security

On Securing Potentially Dangerous Virology Research

Abstract: The problem of securing biological research data is a difficult and complicated one. Our ability to secure data on computers is not robust enough toScience...

Nuclear Fears
From Schneier on Security

Nuclear Fears

Interesting review -- by David Roepik -- of The Rise of Nuclear Fear, by Spencer Weart: Along with contributing to the birth of the environmental movement, Weart...

<i>Top Secret America</i> on the Post-9/11 Cycle of Fear and Funding
From Schneier on Security

Top Secret America on the Post-9/11 Cycle of Fear and Funding

I'm reading Top Secret America: The Rise of the New American Security State, by Dana Priest and William M. Arkin. Both work for The Washington Post. The book...

Russian Nuclear Launch Code Backup Procedure
From Schneier on Security

Russian Nuclear Launch Code Backup Procedure

If the safe doesn't open, use a sledgehammer: The sledgehammer's existence first came to light in 1980, when a group of inspecting officers from the General Staff...

E-Mail Accounts More Valuable than Bank Accounts
From Schneier on Security

E-Mail Accounts More Valuable than Bank Accounts

This informal survey produced the following result: "45% of the users found their email accounts more valuable than their bank accounts." The author believes this...

Stratfor on the Phoenix Serial Flashlight Bomber
From Schneier on Security

Stratfor on the Phoenix Serial Flashlight Bomber

Interesting.

Resilience
From Schneier on Security

Resilience

There was a conference on resilience (highlights here, and complete videos here) earlier this year. Here's an interview with professor Sander van der Leeuw on...

Op-ed Explaining why Terrorism Doesn't Work
From Schneier on Security

Op-ed Explaining why Terrorism Doesn't Work

Good essay by Max Abrams. I've written about his research before.

Friday Squid Blogging: Giant Mutant Squid at the Queen's Jubilee
From Schneier on Security

Friday Squid Blogging: Giant Mutant Squid at the Queen's Jubilee

I think this is a parody, but you can never be sure. Millions of Britons turned out for the Queen

Colbert Report on the Orangutan Cyberthreat
From Schneier on Security

Colbert Report on the Orangutan Cyberthreat

Very funny video expos

Economic Analysis of Bank Robberies
From Schneier on Security

Economic Analysis of Bank Robberies

Yes, it's clever: The basic problem is the average haul from a bank job: for the three-year period, it was only

Far-Fetched Scams Separate the Gullible from Everyone Else
From Schneier on Security

Far-Fetched Scams Separate the Gullible from Everyone Else

Interesting conclusion by Cormac Herley, in this paper: "Why Do Nigerian Scammers Say They are From Nigeria?" Abstract: False positives cause many promising detection...

Apple Patents Data-Poisoning
From Schneier on Security

Apple Patents Data-Poisoning

It's not a new idea, but Apple Computer has received a patent on "Techniques to pollute electronic profiling": Abstract: Techniques to pollute electronic profiling...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account