acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

New Book: <i>Carry On</i>
From Schneier on Security

New Book: Carry On

I have a new book. It's Carry On: Sound Advice from Schneier on Security, and it's my second collection of essays. This book covers my writings from March 2008...

Bruce Schneier Facts T-Shirts
From Schneier on Security

Bruce Schneier Facts T-Shirts

0-Day Clothing has taken 25 Bruce Schneier Facts and turned them into T-shirts just in time for Christmas.

Telepathwords: A New Password Strength Estimator
From Schneier on Security

Telepathwords: A New Password Strength Estimator

Telepathwords is a pretty clever research project that tries to evaluate password strength. It's different from normal strength meters, and I think better. Telepathwords...

Heartwave Biometric
From Schneier on Security

Heartwave Biometric

Here's a new biometric I know nothing about: The wristband relies on authenticating identity by matching the overall shape of the user's heartwave (captured via...

The Problem with EULAs
From Schneier on Security

The Problem with EULAs

Some apps are being distributed with secret Bitcoin-mining software embedded in them. Coins found are sent back to the app owners, of course. And to make it legal...

Evading Airport Security
From Schneier on Security

Evading Airport Security

The news is reporting about Evan Booth, who builds weaponry out of items you can buy after airport security. It's clever stuff. It's not new, though. Peopleexplained...

Keeping Track of All the Snowden Documents
From Schneier on Security

Keeping Track of All the Snowden Documents

As more and more media outlets from all over the world continue to report on the Snowden documents, it's harder and harder to keep track of what has been released...

The TQP Patent
From Schneier on Security

The TQP Patent

One of the things I do is expert witness work in patent litigations. Often, it's defending companies against patent trolls. One of the patents I have worked on...

How Antivirus Companies Handle State-Sponsored Malware
From Schneier on Security

How Antivirus Companies Handle State-Sponsored Malware

Since we learned that the NSA has surreptitiously weakened Internet security so it could more easily eavesdrop, we've been wondering if it's done anything to antivirus...

Friday Squid Blogging: Squid Worm Discovered
From Schneier on Security

Friday Squid Blogging: Squid Worm Discovered

This squid-like worm -- Teuthidodrilus samae -- is new to science. As usual, you can also use this squid post to talk about the security stories in the news that...

More on Stuxnet
From Schneier on Security

More on Stuxnet

Ralph Langer has written the definitive analysis of Stuxnet: short, popular version, and long, technical version. Stuxnet is not really one weapon, but two. The...

Tor Appliance
From Schneier on Security

Tor Appliance

Safeplug is an easy-to-use Tor appliance. I like that it can also act as a Tor exit node.

The FBI Might Do More Domestic Surveillance than the NSA
From Schneier on Security

The FBI Might Do More Domestic Surveillance than the NSA

This is a long article about the FBI's Data Intercept Technology Unit (DITU), which is basically its own internal NSA. It carries out its own signals intelligence...

US Working to Kill UN Resolutions to Limit International Surveillance
From Schneier on Security

US Working to Kill UN Resolutions to Limit International Surveillance

This story should get more publicity than it has.

Surveillance as a Business Model
From Schneier on Security

Surveillance as a Business Model

Google recently announced that it would start including individual users' names and photos in some ads. This means that if you rate some product positively, your...

Friday Squid Blogging: <i>Magnapinna</i> Squid Photo
From Schneier on Security

Friday Squid Blogging: Magnapinna Squid Photo

Neat photo. Video, too. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

Reddit "Ask Me Anything"
From Schneier on Security

Reddit "Ask Me Anything"

I just did an AMA on Reddit.

Rerouting Internet Traffic by Attacking BGP
From Schneier on Security

Rerouting Internet Traffic by Attacking BGP

Renesys is reporting that Internet traffic is being manipulatively rerouted, presumably for eavesdropping purposes. The attacks exploit flaws in the Border Gateway...

How to Avoid Getting Arrested
From Schneier on Security

How to Avoid Getting Arrested

The tips are more psychological than security.

Fokirtor
From Schneier on Security

Fokirtor

Fokirtor is a Linux Trojan that exfiltrates traffic by inserting it into SSH connections. It looks very well-designed and -constructed.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account