acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Hackers Use Backdoor to Break System
From Schneier on Security

Hackers Use Backdoor to Break System

Industrial control system comes with a backdoor: Although the system was password protected in general, the backdoor through the IP address apparently required...

Peruvian Spider Species Creates Decoys
From Schneier on Security

Peruvian Spider Species Creates Decoys

Clyclosa spiders create decoys to fool predators.

Phishing via Twitter
From Schneier on Security

Phishing via Twitter

Interesting firsthand phishing story: A few nights ago, I got a Twitter direct message (DM) from a friend saying that someone was saying nasty things about me,...

Friday Squid Blogging: Laughing Squid
From Schneier on Security

Friday Squid Blogging: Laughing Squid

The small San Francisco film and video company is celebrating its 17th anniversary. As usual, you can also use this squid post to talk about the security stories...

This Week's Overreactions
From Schneier on Security

This Week's Overreactions

Schools go into lockdown over a thermometer, a car backfiring, a bank robbery a few blocks away, a student alone in a gym, a neighbor on the street, and some vague...

Amazon Replacement-Order Scam
From Schneier on Security

Amazon Replacement-Order Scam

Clever: Chris Cardinal discovered someone running such a scam on Amazon using his account: the scammer contacted Amazon pretending to be Chris, supplying his billing...

China Now Blocking Encryption
From Schneier on Security

China Now Blocking Encryption

The "Great Firewall of China" is now able to detect and block encryption: A number of companies providing "virtual private network" (VPN) services to users in...

Information-Age Law Enforcement Techniques
From Schneier on Security

Information-Age Law Enforcement Techniques

This is an interesting blog post: Buried inside a recent United Nations Office on Drugs and Crime report titled Use of Internet for Terrorist Purposes one canHere's...

Nasty Samsung Phone Exploit
From Schneier on Security

Nasty Samsung Phone Exploit

There's a new exploit against Samsung Galaxy phones that allows a rogue app access to all memory. A hacker could copy all of your data, erase all of your data,...

Possible Decryption of World War II Pigeon Message
From Schneier on Security

Possible Decryption of World War II Pigeon Message

A Canadian claims that the message is based on a WWI codebook. A spokesman from GCHQ remains dubious, but says they'll be happy to look at the proposed solution...

Friday Squid Blogging: Giant PVC Squid
From Schneier on Security

Friday Squid Blogging: Giant PVC Squid

Neat art project. Another link. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

Book Review: <i>Against Security</i>
From Schneier on Security

Book Review: Against Security

Against Security: How We Go Wrong at Airports, Subways, and Other Sites of Ambiguous Danger, by Harvey Molotch, Princeton University Press, 278 pages, $35 Security...

The History of Security Economics
From Schneier on Security

The History of Security Economics

Ross Anderson recalls the history of security economics (presentation and paper.)

The Internet in North Korea
From Schneier on Security

The Internet in North Korea

How Internet censorship works in North Korea.

QR Code Scams
From Schneier on Security

QR Code Scams

There's a rise in QR codes that point to fraudulent sites. One of the warning signs seems to be a sticker with the code, rather than a code embedded in an advertising...

Detecting Edited Audio
From Schneier on Security

Detecting Edited Audio

Interesting development in forensic analysis: Comparing the unique pattern of the frequencies on an audio recording with a database that has been logging these...

Drone Flights Over the US
From Schneier on Security

Drone Flights Over the US

The EFF has been prying data out of the government and analyzing it.

<i>The National Cyber Security Framework Manual</i>
From Schneier on Security

The National Cyber Security Framework Manual

This book is available as a free pdf download: The National Cyber Security Framework Manual provides detailed background information and in-depth theoretical frameworks...

Dictators Shutting Down the Internet
From Schneier on Security

Dictators Shutting Down the Internet

Excellent article: "How to Shut Down Internets." First, he describes what just happened in Syria. Then: Egypt turned off the internet by using the Border Gateway...

Bypassing Two-Factor Authentication
From Schneier on Security

Bypassing Two-Factor Authentication

Yet another way two-factor authentication has been bypassed: For a user to fall prey to Eurograbber, he or she must first be using a computer infected with the...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account