acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

I Was on <i>Inventing the Future</i>
From Schneier on Security

I Was on Inventing the Future

I was a guest on Inventing the Future, for an episode on surveillance technology. The video is here.

Hacking the Papal Election
From Schneier on Security

Hacking the Papal Election

As the College of Cardinals prepares to elect a new pope, security people like me wonder about the process. How does it work, and just how hard would it be to hack...

All Those Companies that Can't Afford Dedicated Security
From Schneier on Security

All Those Companies that Can't Afford Dedicated Security

This is interesting: In the security practice, we have our own version of no-man's land, and that's midsize companies. Wendy Nather refers to these folks as being...

More on Chinese Cyberattacks
From Schneier on Security

More on Chinese Cyberattacks

Wow, is this a crazy media frenzy. We should know better. These attacks happen all the time, and just because the media is reporting about them with greater frequency...

Age Biases in Perceptions of Trust
From Schneier on Security

Age Biases in Perceptions of Trust

Interesting research (full article is behind a paywall): Abstract: Older adults are disproportionately vulnerable to fraud, and federal agencies have speculated...

Cheating at Chess
From Schneier on Security

Cheating at Chess

Good summary of cheating in tournament chess.

Fixing Soccer Matches
From Schneier on Security

Fixing Soccer Matches

How international soccer matches are fixed. Right now, Dan Tan's programmers are busy reverse-engineering the safeguards of online betting houses. About $3 billion...

19th-Century Traffic Analysis
From Schneier on Security

19th-Century Traffic Analysis

There's a nice example of traffic analysis in the book No Name, by Wilkie Collins (1862). The attacker, Captain Wragge, needs to know whether a letter has been...

Hacking Citation Counts
From Schneier on Security

Hacking Citation Counts

Hacking citation counts using Google Scholar.

More State-Sponsored Hacking
From Schneier on Security

More State-Sponsored Hacking

After the New York Times broke the story of what seemed to be a state-sponsored hack from China against the newspaper, the Register has stories of two similar attacks...

Automobile Data Surveillance and the Future of Black Boxes
From Schneier on Security

Automobile Data Surveillance and the Future of Black Boxes

Tesla Motors gave one of its electric cars to John Broder, a very outspoken electric-car skeptic from the New York Times, for a test drive. After a negative review...

Friday Squid Blogging: More on Flying Squid
From Schneier on Security

Friday Squid Blogging: More on Flying Squid

Japanese squid researchers have confirmed flying squid can fly, and how they do it. (Note: I have written about flying squid before.) As usual, you can also use...

Jacob Appelbaum's 29C3 Keynote Speech
From Schneier on Security

Jacob Appelbaum's 29C3 Keynote Speech

This speech from last December's 29C3 (29th Chaos Communication Congress) is worth listening to. He talks about what we can do in the face of oppressive power...

Guessing Smart Phone PINs by Monitoring the Accelerometer
From Schneier on Security

Guessing Smart Phone PINs by Monitoring the Accelerometer

"Practicality of Accelerometer Side Channels on Smartphones," by Adam J. Aviv. Benjamin Sapp, Matt Blaze, and Jonathan M. Smith. Abstract: Modern smartphonesArticle...

Using the iWatch for Authentication
From Schneier on Security

Using the iWatch for Authentication

Usability engineer Bruce Tognazzini talks about how an iWatch -- which seems to be either a mythical Apple product or one actually in development -- can make authentication...

Anti-Cheating Security in Casinos
From Schneier on Security

Anti-Cheating Security in Casinos

Long article. With over a thousand cameras operating 24/7, the monitoring room creates tremendous amounts of data every day, most of which goes unseen. Six technicians...

Real-World Prisoner's Dilemma from France
From Schneier on Security

Real-World Prisoner's Dilemma from France

This is a real story of a pair of identical twins who are suspected in a crime. There is there is CCTV and DNA evidence that could implicate either suspect. Detailed...

New al Qaeda Encryption Tool
From Schneier on Security

New al Qaeda Encryption Tool

There's not a lot of information -- and quite a lot of hyperbole -- in this article: With the release of the Asrar Al Dardashah plugin, GIMF promised "secure correspondence"...

Massive Police Shootout in Cleveland Despite Lack of Criminals
From Schneier on Security

Massive Police Shootout in Cleveland Despite Lack of Criminals

This is an amazing story. I urge you to read the whole thing, but here's the basics: A November car chase ended in a "full blown-out" firefight, with glass and...

Our New Regimes of Trust
From Schneier on Security

Our New Regimes of Trust

Society runs on trust. Over the millennia, we've developed a variety of mechanisms to induce trustworthy behavior in society. These range from a sense of guiltThis...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account