acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Friday Squid Blogging: Squid Jigging
From Schneier on Security

Friday Squid Blogging: Squid Jigging

Good news from Malaysia: The Terengganu International Squid Jigging Festival (TISJF) will be continued and become an annual event as one of the state's main tourism...

Metaphors of Surveillance
From Schneier on Security

Metaphors of Surveillance

There's a new study looking at the metaphors we use to describe surveillance. Over 62 days between December and February, we combed through 133 articles by 105...

Reverse Heartbleed
From Schneier on Security

Reverse Heartbleed

Heartbleed can affect clients as well as servers....

Overreacting to Risk
From Schneier on Security

Overreacting to Risk

This is a crazy overreaction: A 19-year-old man was caught on camera urinating in a reservoir that holds Portland's drinking water Wednesday, according to city...

Tails
From Schneier on Security

Tails

Nice article on the Tails stateless operating system. I use it. Initially I would boot my regular computer with Tails on a USB stick, but I went out and bought...

Book Title
From Schneier on Security

Book Title

I previously posted that I am writing a book on security and power. Here are some title suggestions: Permanent Record: The Hidden Battles to Capture Your Data and...

Schneier Speaking Schedule: April–May
From Schneier on Security

Schneier Speaking Schedule: April–May

Here's my upcoming speaking schedule for April and May: Stanford Law School on April 15. Brown University in Providence, RI -- two times -- on April 24. The Global...

Schneier Talks and Interviews
From Schneier on Security

Schneier Talks and Interviews

Here are three articles about me from the last month. Also these three A/V links....

Auditing TrueCrypt
From Schneier on Security

Auditing TrueCrypt

Recently, Matthew Green has been leading an independent project to audit TrueCrypt. Phase I, a source code audit by iSEC Partners, is complete. Next up is Phase...

GoGo Wireless Adds Surveillance Capabilities for Government
From Schneier on Security

GoGo Wireless Adds Surveillance Capabilities for Government

The important piece of this story is not that GoGo complies with the law, but that it goes above and beyond what is required by law. It has voluntarily decided...

Friday Squid Blogging: Bronze Giant Squid Sculpture
From Schneier on Security

Friday Squid Blogging: Bronze Giant Squid Sculpture

A little too big for my house....

More on Heartbleed
From Schneier on Security

More on Heartbleed

This is an update to my earlier post. Cloudflare is reporting that its very difficult, if not practically impossible, to steal SSL private keys with this attack...

Police Disabling Their own Voice Recorders
From Schneier on Security

Police Disabling Their own Voice Recorders

This is not a surprise: The Los Angeles Police Commission is investigating how half of the recording antennas in the Southeast Division went missing, seemingly...

Heartbleed
From Schneier on Security

Heartbleed

Heartbleed is a catastrophic bug in OpenSSL: "The Heartbleed bug allows anyone on the Internet to read the memory of the systems protected by the vulnerable versions...

"Unbreakable" Encryption Almost Certainly Isn't
From Schneier on Security

"Unbreakable" Encryption Almost Certainly Isn't

This headline is provocative: "Human biology inspires 'unbreakable' encryption." The article is similarly nonsensical: Researchers at Lancaster University, UK have...

The Youngest Security Researcher
From Schneier on Security

The Youngest Security Researcher

Five-year-old finds login vulnerability in Microsoft Xbox....

Friday Squid Blogging: Squid + Security in a Cartoon
From Schneier on Security

Friday Squid Blogging: Squid + Security in a Cartoon

Funny....

Mass Surveillance by Eavesdropping on Web Cookies
From Schneier on Security

Mass Surveillance by Eavesdropping on Web Cookies

Interesting research: Abstract: We investigate the ability of a passive network observer to leverage third-party HTTP tracking cookies for mass surveillance. If...

Ephemeral Apps
From Schneier on Security

Ephemeral Apps

Ephemeral messaging apps such as Snapchat, Wickr and Frankly, all of which advertise that your photo, message or update will only be accessible for a short period...

Seventh Movie-Plot Threat Contest
From Schneier on Security

Seventh Movie-Plot Threat Contest

As you might expect, this year's contest has the NSA as the villain: The NSA has won, but how did it do it? How did it use its ability to conduct ubiquitous surveillance...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account