acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorBruce Schneier
bg-corner

Why We Encrypt
From Schneier on Security

Why We Encrypt

Encryption protects our data. It protects our data when it's sitting on our computers and in data centers, and it protects it when it's being transmitted around...

History of the First Crypto War
From Schneier on Security

History of the First Crypto War

As we're all gearing up to fight the Second Crypto War over governments' demands to be able to back-door any cryptographic system, it pays for us to remember the...

The Secrecy of the Snowden Documents
From Schneier on Security

The Secrecy of the Snowden Documents

Last weekend, the Sunday Times published a front-page story (full text here), citing anonymous British sources claiming that both China and Russia have copies of...

Friday Squid Blogging: Squid Salad Servers
From Schneier on Security

Friday Squid Blogging: Squid Salad Servers

Nice. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Counterfeit Social Media Accounts
From Schneier on Security

Counterfeit Social Media Accounts

Interesting article on the inner workings of a Facebook account farm, with commentary on fake social media accounts in general....

Hacking Drug Pumps
From Schneier on Security

Hacking Drug Pumps

When you connect hospital drug pumps to the Internet, they're hackable -- only surprising people who aren't paying attention. Rios says when he first told Hospira...

Research on The Trade-off Between Free Services and Personal Data
From Schneier on Security

Research on The Trade-off Between Free Services and Personal Data

New report: "The Tradeoff Fallacy: How marketers are misrepresenting American consumers and opening them up to exploitation." New Annenberg survey results indicate...

Peter Swire on the USA FREEDOM Act
From Schneier on Security

Peter Swire on the USA FREEDOM Act

Peter Swire, law professor and one of the members of the President's review group on the NSA, writes about intelligence reform and the USA FREEDOM Act....

Encrypting Windows Hard Drives
From Schneier on Security

Encrypting Windows Hard Drives

Encrypting your Windows hard drives is trivially easy; choosing which program to use is annoyingly difficult. I still use Windows -- yes, I know, don't even start...

Eighth Movie-Plot Threat Contest Winner
From Schneier on Security

Eighth Movie-Plot Threat Contest Winner

On April 1, I announced the Eighth Movie-Plot Threat Contest: I want a movie-plot threat that shows the evils of encryption. (For those who don't know, a movie-plot...

Friday Squid Blogging: Dancing Zombie Squid
From Schneier on Security

Friday Squid Blogging: Dancing Zombie Squid

How dead squid is made to dance when soy sauce is poured on it. As usual, you can also use this squid post to talk about the security stories in the news that I...

Uh Oh -- Robots Are Getting Good with Samurai Swords
From Schneier on Security

Uh Oh -- Robots Are Getting Good with Samurai Swords

It's Iaido, not sword fighting, but still. Of course, the two didn't battle each other, but competed in Iaido tests like cutting mats and flowers in various cross...

The History of Internet Insecurity
From Schneier on Security

The History of Internet Insecurity

The Washington Post has a good two part story on the history of insecurity of the Internet....

Duqu 2.0
From Schneier on Security

Duqu 2.0

Kaspersky Labs has discovered and publicized details of a new nation-state surveillance malware system, called Duqu 2.0. It's being attributed to Israel. There's...

Security and Human Behavior (SHB 2015)
From Schneier on Security

Security and Human Behavior (SHB 2015)

Earlier this week, I was at the eighth Workshop on Security and Human Behavior. This is a small invitational gathering of people studying various aspects of the...

Reassessing Airport Security
From Schneier on Security

Reassessing Airport Security

News that the Transportation Security Administration missed a whopping 95% of guns and bombs in recent airport security "red team" tests was justifiably shocking...

Should Companies Do Most of Their Computing in the Cloud? (Part 3)
From Schneier on Security

Should Companies Do Most of Their Computing in the Cloud? (Part 3)

Cloud computing is the future of computing. Specialization and outsourcing make society more efficient and scalable, and computing isn't any different. But why...

Should Companies Do Most of Their Computing in the Cloud? (Part 2)
From Schneier on Security

Should Companies Do Most of Their Computing in the Cloud? (Part 2)

Let me start by describing two approaches to the cloud. Most of the students I meet at Harvard University live their lives in the cloud. Their e-mail, documents...

Should Companies Do Most of Their Computing in the Cloud? (Part 1)
From Schneier on Security

Should Companies Do Most of Their Computing in the Cloud? (Part 1)

Yes. No. Yes. Maybe. Yes. Okay, it's complicated. The economics of cloud computing are compelling. For companies, the lower operating costs, the lack of capital...

The Effects of Near Misses on Risk Decision-Making
From Schneier on Security

The Effects of Near Misses on Risk Decision-Making

This is interesting research: "How Near-Miss Events Amplify or Attenuate Risky Decision Making," Catherine H. Tinsley, Robin L. Dillon, and Matthew A. Cronin. In...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account