acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

I Seem to Be a Physical Security Expert Now
From Schneier on Security

I Seem to Be a Physical Security Expert Now

This seems so obviously written by someone who Googled me on the Internet, without any other knowledge of who I am or what i do.

Millennials and Cybersecurity
From Schneier on Security

Millennials and Cybersecurity

This long report looks at risky online behavior among the Millennial generation, and finds that they respond positively to automatic reminders and prodding. No...

Inauguration Security
From Schneier on Security

Inauguration Security

A first-person account of the security surrounding the second inauguration of President Obama.

Tide Becomes Drug Currency
From Schneier on Security

Tide Becomes Drug Currency

Basically, Tide detergent is a popular product with a very small profit margin. So small non-chain grocery and convenience stores are happy to buy it cheaply,started...

Over $3M in Prizes to Hack Google Chrome
From Schneier on Security

Over $3M in Prizes to Hack Google Chrome

Google's contest at the CanSecWest conference: Today we’re announcing our third Pwnium competition­Pwnium 3. Google Chrome is already featured in the Pwn2Own competition...

Why Is Quantum Computing So Hard?
From Schneier on Security

Why Is Quantum Computing So Hard?

Blog post (and two papers) by Ross Anderson and Robert Brady. News article.

<i>New York Times</i> Hacked by China
From Schneier on Security

New York Times Hacked by China

This was big news last week, and I spent a lot of time doing press interviews about it. But while it is an important story -- hacking a newspaper, looking forGhostNet...

Anti-Drone Clothing
From Schneier on Security

Anti-Drone Clothing

Clothing designed to thwart drones.

Proactive Defense Papers
From Schneier on Security

Proactive Defense Papers

I just printed this out: "Proactive Defense for Evolving Cyber Threats," a Sandia Report by Richard Colbaugh and Kristin Glass. It's a collection of academic...

Security Seals
From Schneier on Security

Security Seals

I don't see a lot written about security seals, despite how common they are. This article is a very basic overview of the technologies.

Using Imagery to Avoid Censorship
From Schneier on Security

Using Imagery to Avoid Censorship

Interesting: "It's really hard for the government to censor things when they don't understand the made-up words or meaning behind the imagery," said Kevin Lee,...

Friday Squid Blogging: Squid Anchor
From Schneier on Security

Friday Squid Blogging: Squid Anchor

Webpage says that it's "the most effective lightweight, portable anchor around." As usual, you can also use this squid post to talk about the security stories...

Pentagon Staffs Up U.S. Cyber Command
From Schneier on Security

Pentagon Staffs Up U.S. Cyber Command

The Washington Post has the story: The move, requested by the head of the Defense Department's Cyber Command, is part of an effort to turn an organization that...

Jared Diamond on Common Risks
From Schneier on Security

Jared Diamond on Common Risks

Jared Diamond has an op-ed in the New York Times where he talks about how we overestimate rare risks and underestimate common ones. Nothing new here -- I and others...

The Eavesdropping System in Your Computer
From Schneier on Security

The Eavesdropping System in Your Computer

Dan Farmer has an interesting paper (long version here; short version here) discussing the Baseboard Management Controller on your computer's motherboard: The ...

Power and the Internet
From Schneier on Security

Power and the Internet

All disruptive technologies upset traditional power balances, and the Internet is no exception. The standard story is that it empowers the powerless, but that's...

"People, Process, and Technology"
From Schneier on Security

"People, Process, and Technology"

Back in 1999 when I formed Counterpane Internet Security, Inc., I popularized the notion that security was a combination of people, process, and technology. Back...

Who Does Skype Let Spy?
From Schneier on Security

Who Does Skype Let Spy?

Lately I've been thinking a lot about power and the Internet, and what I call the feudal model of IT security that is becoming more and more pervasive. Basically...

Backdoors Built in to Barracuda Networks Equipment
From Schneier on Security

Backdoors Built in to Barracuda Networks Equipment

Don't we know enough not to do this anymore?

Complexity and Security
From Schneier on Security

Complexity and Security

I have written about complexity and security for over a decade now (for example, this from 1999). Here's the results of a survey that confirms this: Results showed...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account