acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorBruce Schneier
bg-corner

Incenting Drug Dealers to Snitch on Each Other
From Schneier on Security

Incenting Drug Dealers to Snitch on Each Other

Local police are trying to convince drug dealers to turn each other in by pointing out that it reduces competition. It's a comical tactic with serious results:...

Detecting Betrayal in Diplomacy Games
From Schneier on Security

Detecting Betrayal in Diplomacy Games

Interesting research detecting betrayal in the game of Diplomacy by analyzing interplayer messages. One harbinger was a shift in politeness. Players who were excessively...

Friday Squid Blogging: Divers Find Squid Eggs
From Schneier on Security

Friday Squid Blogging: Divers Find Squid Eggs

Divers discover a large mass of Ommastrephes bartramii eggs: Earlier this month, a team of divers swimming off the coast of Turkey discovered something unexpected...

Meerkats that Look like Bruce Schneier
From Schneier on Security

Meerkats that Look like Bruce Schneier

Yet another example of my surreal life. (No, I have no idea who did this.)...

The Outing of ECHELON
From Schneier on Security

The Outing of ECHELON

Before Edward Snowden told us so much about NSA surveillance, before Mark Klein told us a little, even before 9/11, Duncan Campbell broke the story of ECHELON....

Security for the Rest of Us
From Schneier on Security

Security for the Rest of Us

Good fictional account of an average computer user and how people understand and view security. Related: "Real World Use Cases for High-Risk Users."...

Nicholas Weaver on iPhone Security
From Schneier on Security

Nicholas Weaver on iPhone Security

Excellent essay: Yes, an iPhone configured with a proper password has enough protection that, turned off, I'd be willing to hand mine over to the DGSE, NSA, or...

Face Recognition by Thermal Imaging
From Schneier on Security

Face Recognition by Thermal Imaging

New research can identify a person by reading their thermal signature in complete darkness and then matching it with ordinary photographs. Research paper: Abstract...

Shooting Down Drones
From Schneier on Security

Shooting Down Drones

A Kentucky man shot down a drone that was hovering in his backyard: "It was just right there," he told Ars. "It was hovering, I would never have shot it if it was...

Vulnerabilities in Brink's Smart Safe
From Schneier on Security

Vulnerabilities in Brink's Smart Safe

Brink's sells an Internet-enabled smart safe called the CompuSafe Galileo. Despite being sold as a more secure safe, it's wildly insecure: Vulnerabilities found...

Help with Mailing List Hosting
From Schneier on Security

Help with Mailing List Hosting

I could use some help finding a host for my monthly newsletter, Crypto-Gram. My old setup just wasn't reliable enough. I had a move planned, but that fell through...

John Mueller on the Overblown ISIS Threat
From Schneier on Security

John Mueller on the Overblown ISIS Threat

John Mueller has a good essay on how the ISIS threat is overblown....

Friday Squid Blogging: Russian Sailors Video Colossal Squid
From Schneier on Security

Friday Squid Blogging: Russian Sailors Video Colossal Squid

It tried to steal their catch. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Schneier Speaking Schedule
From Schneier on Security

Schneier Speaking Schedule

I'm speaking at an Infoedge event at Bali Hai Golf Club in Las Vegas, at 5 PM on August 5, 2015. I'm speaking at DefCon 23 on Friday, August 7, 2015. I'm speaking...

HAMMERTOSS: New Russian Malware
From Schneier on Security

HAMMERTOSS: New Russian Malware

Fireeye has a detailed report of a sophisticated piece of Russian malware: HAMMERTOSS. It uses some clever techniques to hide: The Hammertoss backdoor malware looks...

Back Doors Won't Solve Comey's Going Dark Problem
From Schneier on Security

Back Doors Won't Solve Comey's Going Dark Problem

At the Aspen Security Forum two weeks ago, James Comey (and others) explicitly talked about the "going dark" problem, describing the specific scenario they are...

Comparing the Security Practices of Experts and Non-Experts
From Schneier on Security

Comparing the Security Practices of Experts and Non-Experts

New paper: "'...no one can hack my mind': Comparing Expert and Non-Expert Security Practices," by Iulia Ion, Rob Reeder, and Sunny Consolvo. Abstract: The state...

The NSA, Metadata, and the Failure of Stopping 9/11
From Schneier on Security

The NSA, Metadata, and the Failure of Stopping 9/11

It's common wisdom that the NSA was unable to intercept phone calls from Khalid al-Mihdhar in San Diego to Bin Ladin in Yemen because of legal restrictions. This...

Fugitive Located by Spotify
From Schneier on Security

Fugitive Located by Spotify

The latest in identification by data: Webber said a tipster had spotted recent activity from Nunn on the Spotify streaming service and alerted law enforcement....

Bizarre High-Tech Kidnapping
From Schneier on Security

Bizarre High-Tech Kidnapping

This is a story of a very high-tech kidnapping: FBI court filings unsealed last week showed how Denise Huskins' kidnappers used anonymous remailers, image sharing...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account