acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Another WWII Message Decoded
From Schneier on Security

Another WWII Message Decoded

It's a really interesting code and story. (The first link has the most detailed information about the code and the cryptanalysis.)

The Public/Private Surveillance Partnership
From Schneier on Security

The Public/Private Surveillance Partnership

Our government collects a lot of information about us. Tax records, legal records, license records, records of government services received-- it's all in databases...

Risks of Networked Systems
From Schneier on Security

Risks of Networked Systems

Interesting research: Helbing's publication illustrates how cascade effects and complex dynamics amplify the vulnerability of networked systems. For example, just...

More on FinSpy/FinFisher
From Schneier on Security

More on FinSpy/FinFisher

FinFisher (also called FinSpy) is a commercially sold spyware package that is used by governments world-wide, including the U.S. There's a new report that hasbunch...

Google Pays $31,000 for Three Chrome Vulnerabilities
From Schneier on Security

Google Pays $31,000 for Three Chrome Vulnerabilities

Google is paying bug bounties. This is important; there's a market in vulnerabilities that provides incentives for their being kept secret and exploitable; for...

Details of a Cyberheist
From Schneier on Security

Details of a Cyberheist

Really interesting article detailing how criminals steal from a company's accounts over the Internet. The costly cyberheist was carried out with the help of nearly...

The Importance of Backups
From Schneier on Security

The Importance of Backups

I've already written about the guy who got a new trial because a virus ate his court records. Here's someone who will have to redo his thesis research because...

Pinging the Entire Internet
From Schneier on Security

Pinging the Entire Internet

Turns out there's a lot of vulnerable systems out there: Many of the two terabytes (2,000 gigabytes) worth of replies Moore received from 310 million IPs indicated...

More Links on the Boston Terrorist Attacks
From Schneier on Security

More Links on the Boston Terrorist Attacks

Max Abrahms has two sensible essays. Probably the ultimate in security theater: Williams-Sonoma stops selling pressure cookers "out of respect." They say it's...

Friday Squid Blogging: Lego Giant Squid Model
From Schneier on Security

Friday Squid Blogging: Lego Giant Squid Model

This is a fantastic Lego model of a space kraken attacking a Star Wars Super Star Destroyer. As usual, you can also use this squid post to talk about the security...

xkcd on a Bad Threat Model
From Schneier on Security

xkcd on a Bad Threat Model

Funny, and true.

Tor Needs Bridges
From Schneier on Security

Tor Needs Bridges

The Internet anonymity service Tor needs people who are willing to run bridges. It's a goodness for the world; do it if you can.

Cryptanalyst on British Postage Stamps
From Schneier on Security

Cryptanalyst on British Postage Stamps

A 92-year-old World War II Bletchley Park codebreaker has had a set of commemorative stamps issued in his honor.

Random Links on the Boston Terrorist Attack
From Schneier on Security

Random Links on the Boston Terrorist Attack

Encouraging poll data says that maybe Americans are starting to have realistic fears about terrorism, or at least are refusing to be terrorized. Good essay byapologizes...

Ellen on Protecting Passwords
From Schneier on Security

Ellen on Protecting Passwords

Pretty good video. Ellen makes fun of the "Internet Password Minder," which is -- if you think about it -- only slightly different than Password Safe.

More Plant Security Countermeasures
From Schneier on Security

More Plant Security Countermeasures

I've talked about plant security systems, both here and in Beyond Fear. Specifically, I've talked about tobacco plants that call air strikes against insects...

The Police Now Like Amateur Photography
From Schneier on Security

The Police Now Like Amateur Photography

PhotographyIsNotACrime.com points out the obvious: after years of warning us that photography is suspicious, the police were happy to accept all of those amateur...

Securing Members of Congress from Transparency
From Schneier on Security

Securing Members of Congress from Transparency

I commented in this article on the repeal of the transparency provisions of the STOCK Act: Passed in 2012 after a 60 Minutes report on insider trading practices...

About Police Shoot Outs and Spectators
From Schneier on Security

About Police Shoot Outs and Spectators

Hopefully this advice is superfluous for my audience, but it's so well written it's worth reading nonetheless: 7. SO, the bottom line is this: If you are in a...

A Discussion of Redaction
From Schneier on Security

A Discussion of Redaction

Interesting.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account