acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Friday Squid Blogging: The Unique Reproductive Habits of the Vampire Squid
From Schneier on Security

Friday Squid Blogging: The Unique Reproductive Habits of the Vampire Squid

Interesting: While most female squid and octopuses have just one reproductive cycle before they die, vampire squid go through dozens of egg-making cycles in their...

Signed Copies of Data and Goliath
From Schneier on Security

Signed Copies of Data and Goliath

You can now order signed copies of Data and Goliath from my website....

Federal Trade Commissioner Julie Brill on Obscurity
From Schneier on Security

Federal Trade Commissioner Julie Brill on Obscurity

I think this is good: Obscurity means that personal information isn't readily available to just anyone. It doesn't mean that information is wiped out or even locked...

The Further Democratization of QUANTUM
From Schneier on Security

The Further Democratization of QUANTUM

From Data and Goliath: ...when I was working with the Guardian on the Snowden documents, the one top-secret program the NSA desperately did not want us to expose...

An Incredibly Insecure Voting Machine
From Schneier on Security

An Incredibly Insecure Voting Machine

Wow: The weak passwords -- which are hard-coded and can't be changed -- were only one item on a long list of critical defects uncovered by the review. The Wi-Fi...

"Hinky" in Action
From Schneier on Security

"Hinky" in Action

In Beyond Fear I wrote about trained officials recognizing "hinky" and how it differs from profiling: Ressam had to clear customs before boarding the ferry. He...

Hacking Airplanes
From Schneier on Security

Hacking Airplanes

Imagine this: A terrorist hacks into a commercial airplane from the ground, takes over the controls from the pilots and flies the plane into the ground. It sounds...

Hacker Detained by FBI after Tweeting about Airplane Software Vulnerabilities
From Schneier on Security

Hacker Detained by FBI after Tweeting about Airplane Software Vulnerabilities

This is troubling: Chris Roberts was detained by FBI agents on Wednesday as he was deplaning his United flight, which had just flown from Denver to Syracuse, New...

Counting the US Intelligence Community Leakers
From Schneier on Security

Counting the US Intelligence Community Leakers

It's getting hard to keep track of the US intelligence community leakers without a scorecard. So here's my attempt: Leaker #1: Chelsea Manning. Leaker #2: Edward...

New Top Secret Information on the US's Drone Program
From Schneier on Security

New Top Secret Information on the US's Drone Program

New operational information on the US's drone program, published by the Intercept and Der Speigel....

Friday Squid Blogging: Squid Hoodie
From Schneier on Security

Friday Squid Blogging: Squid Hoodie

This is neat. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

The No-Fly List and Due Process
From Schneier on Security

The No-Fly List and Due Process

The Congressional Research Service has released a report on the no-fly list and current litigation that it violates due process....

How Many Vulnerabilities Are there in Software?
From Schneier on Security

How Many Vulnerabilities Are there in Software?

Dan Geer proposes some techniques for answering this question....

Metal Detectors at Sports Stadiums
From Schneier on Security

Metal Detectors at Sports Stadiums

Fans attending Major League Baseball games are being greeted in a new way this year: with metal detectors at the ballparks. Touted as a counterterrorism measure...

John Oliver Interviews Edward Snowden
From Schneier on Security

John Oliver Interviews Edward Snowden

Wow, what an amazing segment and interview....

Two Thoughtful Essays on the Future of Privacy
From Schneier on Security

Two Thoughtful Essays on the Future of Privacy

Paul Krugman argues that we'll give up our privacy because we want to emulate the rich, who are surrounded by servants who know everything about them: Consider...

China's Great Cannon
From Schneier on Security

China's Great Cannon

Citizen Lab has issued a report on China's "Great Cannon" attack tool, used in the recent DDoS attack against GitHub. We show that, while the attack infrastructure...

Alternatives to the FBI's Manufacturing of Terrorists
From Schneier on Security

Alternatives to the FBI's Manufacturing of Terrorists

John Mueller suggests an alternative to the FBI's practice of encouraging terrorists and then arresting them for something they would have never have planned on...

Pepper-Spray Drones
From Schneier on Security

Pepper-Spray Drones

India has purchased pepper-spray drones....

Attacking Researchers Who Expose Voting Vulnerabilities
From Schneier on Security

Attacking Researchers Who Expose Voting Vulnerabilities

Researchers found voting-system flaws in New South Wales, and were attacked by voting officials and the company that made the machines....
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account