acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorBruce Schneier
bg-corner

Should Companies Do Most of Their Computing in the Cloud? (Part 1)
From Schneier on Security

Should Companies Do Most of Their Computing in the Cloud? (Part 1)

Yes. No. Yes. Maybe. Yes. Okay, it's complicated. The economics of cloud computing are compelling. For companies, the lower operating costs, the lack of capital...

The Effects of Near Misses on Risk Decision-Making
From Schneier on Security

The Effects of Near Misses on Risk Decision-Making

This is interesting research: "How Near-Miss Events Amplify or Attenuate Risky Decision Making," Catherine H. Tinsley, Robin L. Dillon, and Matthew A. Cronin. In...

Surveillance Law and Surveillance Studies
From Schneier on Security

Surveillance Law and Surveillance Studies

Interesting paper by Julie Cohen: Abstract: The dialogue between law and Surveillance Studies has been complicated by a mutual misrecognition that is both theoretical...

Tracking People By Smart Phone Accelerometers
From Schneier on Security

Tracking People By Smart Phone Accelerometers

Interesting research: "We Can Track You If You Take the Metro: Tracking Metro Riders Using Accelerometers on Smartphones": Abstract: Motion sensors (e.g., accelerometers)...

Friday Squid Blogging: Giant Squid Lore
From Schneier on Security

Friday Squid Blogging: Giant Squid Lore

Legends of giant squid go back centuries: In his book "The Search for the Giant Squid" marine biologist Richard Ellis notes that "There is probably no apparition...

US Identifies and Destroys ISIS Headquarters Because of "Selfie"
From Schneier on Security

US Identifies and Destroys ISIS Headquarters Because of "Selfie"

The news media is buzzing about how the US military identified the location of an ISIS HQ because someone there took a photo and posted it. Quoting Air Force General...

NSA Running a Massive IDS on the Internet Backbone
From Schneier on Security

NSA Running a Massive IDS on the Internet Backbone

The latest story from the Snowden documents, co-published by The New York Times and ProPublica, shows that the NSA is operating a signature-based intrusion detection...

Yet Another New Biometric: Brainprints
From Schneier on Security

Yet Another New Biometric: Brainprints

New research: In "Brainprint," a newly published study in academic journal Neurocomputing, researchers from Binghamton University observed the brain signals of...

2015 EPIC Champions of Freedom Dinner
From Schneier on Security

2015 EPIC Champions of Freedom Dinner

Monday night, EPIC -- that's the Electronic Privacy Information Center -- had its annual Champions of Freedom Dinner. I tell you this for two reasons. One, I received...

Smart Billboards Recognize Cops
From Schneier on Security

Smart Billboards Recognize Cops

There are smart billboards in Russia that change what they display when cops are watching. Of course there are a gazillion ways this kind of thing will go wrong...

The Onion on NSA Surveillance
From Schneier on Security

The Onion on NSA Surveillance

Funny, and true. More seriously....

TSA Not Detecting Weapons at Security Checkpoints
From Schneier on Security

TSA Not Detecting Weapons at Security Checkpoints

This isn't good: An internal investigation of the Transportation Security Administration revealed security failures at dozens of the nation's busiest airports,...

Fun NSA Surveillance Quizzes
From Schneier on Security

Fun NSA Surveillance Quizzes

Okay, maybe not so fun. Quiz 1: "Just How Kafkaesque is the Court that Oversees NSA Spying?" Quiz 2: "Can You Tell the Difference Between Bush and Obama on the...

US Also Tried Stuxnet Against North Korea
From Schneier on Security

US Also Tried Stuxnet Against North Korea

According to a Reuters article, the US military tried to launch Stuxnet against North Korea in addition to Iran: According to one U.S. intelligence source, Stuxnet's...

Friday Squid Blogging: Nutty Conspiracy Theory Involving Both the NSA and SQUID
From Schneier on Security

Friday Squid Blogging: Nutty Conspiracy Theory Involving Both the NSA and SQUID

It's almost as if they wrote it for me. These devices, which are known as super conducting quantum interference devices (SQUIDS for short), can be attached to NSA...

UN Report on the Value of Encryption to Freedom World-Wide
From Schneier on Security

UN Report on the Value of Encryption to Freedom World-Wide

United Nation's Office of the High Commissioner released a report on the value of encryption and anonymity to the world: Summary: In the present report, submitted...

Ransomware as a Service
From Schneier on Security

Ransomware as a Service

Tox is an outsourced ransomware platform that everyone can use....

MOOC on Cybersecurity
From Schneier on Security

MOOC on Cybersecurity

The University of Adelaide is offering a new MOOC on "Cyberwar, Surveillance and Security." Here's a teaser video. I was interviewed for the class, and make a brief...

Terrorist Risks by City, According to Actual Data
From Schneier on Security

Terrorist Risks by City, According to Actual Data

I don't know enough about the methodology to judge it, but it's interesting: In total, 64 cities are categorised as 'extreme risk' in Verisk Maplecroft's new Global...

Race Condition Exploit in Starbucks Gift Cards
From Schneier on Security

Race Condition Exploit in Starbucks Gift Cards

A researcher was able to steal money from Starbucks by exploiting a race condition in their gift-card value-transfer protocol. Basically, by initiating two identical...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account