acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Security Analysis of Children
From Schneier on Security

Security Analysis of Children

This is a really good paper describing the unique threat model of children in the home, and the sorts of security philosophies that are effective in dealing with...

NSA E-Mail Eavesdropping
From Schneier on Security

NSA E-Mail Eavesdropping

More Snowden documents analyzed by the Guardian -- two articles -- discuss how the NSA collected e-mails and data on Internet activity of both Americans and foreigners...

I've Joined the EFF Board
From Schneier on Security

I've Joined the EFF Board

I'm now on the board of directors of the EFF.

How the NSA Eavesdrops on Americans
From Schneier on Security

How the NSA Eavesdrops on Americans

Two weeks ago, the Guardian published two new Snowden documents. These outline how the NSA's data-collection procedures allow it to collect lots of data on Americans...

SIMON and SPECK: New NSA Encryption Algorithms
From Schneier on Security

SIMON and SPECK: New NSA Encryption Algorithms

The NSA has published some new symmetric algorithms: Abstract: In this paper we propose two families of block ciphers, SIMON and SPECK, each of which comes in...

Friday Squid Blogging: Man Pulled Under by Squids
From Schneier on Security

Friday Squid Blogging: Man Pulled Under by Squids

Video story on Animal Planet. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

Me on EconTalk
From Schneier on Security

Me on EconTalk

Another audio interview; this one is mostly about security and power.

My Talk at Google
From Schneier on Security

My Talk at Google

Last week, I gave a talk at Google. It's another talk about power and security, my continually evolving topic-of-the-moment that could very well become my next...

Preventing Cell Phone Theft through Benefit Denial
From Schneier on Security

Preventing Cell Phone Theft through Benefit Denial

Adding a remote kill switch to cell phones would deter theft. Here we can see how the rise of the surveillance state permeates everything about computer security...

Malware that Foils Two-Factor Authentication
From Schneier on Security

Malware that Foils Two-Factor Authentication

This is an interesting article about a new breed of malware that also hijack's the victim's phone text messaging system, to intercept one-time passwords sent via...

Pre-9/11 NSA Thinking
From Schneier on Security

Pre-9/11 NSA Thinking

This quote is from the Spring 1997 issue of CRYPTOLOG, the internal NSA newsletter. The writer is William J. Black, Jr., the Director's Special Assistant for Information...

Lessons from Biological Security
From Schneier on Security

Lessons from Biological Security

Nice essay: The biological world is also open source in the sense that threats are always present, largely unpredictable, and always changing. Because of this,...

Secrecy and Privacy
From Schneier on Security

Secrecy and Privacy

Interesting article on the history of, and the relationship between, secrecy and privacy As a matter of historical analysis, the relationship between secrecy and...

Cracking the Kryptos Sculpture
From Schneier on Security

Cracking the Kryptos Sculpture

Great story.

MAD in Cyberspace
From Schneier on Security

MAD in Cyberspace

Ron Beckstrom gives a talk (video and transcript) about "Mutually Assured Destruction," "Mutually Assured Disruption," and "Mutually Assured Dependence."

Spear Phishing Attack Against the <cite>Financial Times</cite>
From Schneier on Security

Spear Phishing Attack Against the Financial Times

Interesting story with a lot of details.

The Future of Satellite Surveillance
From Schneier on Security

The Future of Satellite Surveillance

Pretty scary -- and cool. Remember, it's not any one thing that's worrisome; it's everything together.

Friday Squid Blogging: How the Acidification of the Oceans Affects Squid
From Schneier on Security

Friday Squid Blogging: How the Acidification of the Oceans Affects Squid

It's not good. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

Me on the Lou Dobbs Show
From Schneier on Security

Me on the Lou Dobbs Show

I was on the Lou Dobbs Show earlier this week.

US Offensive Cyberwar Policy
From Schneier on Security

US Offensive Cyberwar Policy

Today, the United States is conducting offensive cyberwar actions around the world. More than passively eavesdropping, we're penetrating and damaging foreign networks...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account