acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Buy Your Own ATM Skimmer for $3000
From Schneier on Security

Buy Your Own ATM Skimmer for $3000

I have no idea if this is real. If I had to guess, I would say no.

Squids on the <i>Economist</i> Cover
From Schneier on Security

Squids on the Economist Cover

Four squids on the cover of this week's Economist represent the four massive (and intrusive) data-driven Internet giants: Google, Facebook, Apple, and Amazon. Interestingly...

Comedy and Cryptography
From Schneier on Security

Comedy and Cryptography

Not the sort of pairing I normally think of, but: Robin Ince and Brian Cox are joined on stage by comedian Dave Gorman, author and Enigma Machine owner Simon Singh...

Roger Williams' Cipher Cracked
From Schneier on Security

Roger Williams' Cipher Cracked

Another historical cipher, this one from the 1600s, has been cracked: Senior math major Lucas Mason-Brown, who has done the majority of the decoding, said his...

Feudal Security
From Schneier on Security

Feudal Security

It’s a feudal world out there. Some of us have pledged our allegiance to Google: We have Gmail accounts, we use Google Calendar and Google Docs, and we have Android...

Friday Squid Blogging: Possible Squid Eyeball Found in Florida
From Schneier on Security

Friday Squid Blogging: Possible Squid Eyeball Found in Florida

It's the size of a softball. No sign of the squid it came from. As usual, you can also use this squid post to talk about the security stories in the news that...

Hacking by the Syrian Government
From Schneier on Security

Hacking by the Syrian Government

Good article on how the Syrian government hacked into the computers of dissidents: The cyberwar in Syria began with a feint. On Feb. 8, 2011, just as the Arabmanifesto...

Advances in Attacking ATMs
From Schneier on Security

Advances in Attacking ATMs

Cash traps and card traps are the new thing: [Card traps] involve devices that fit over the card acceptance slot and include a razor-edged spring trap that prevents...

James Bond Movie-Plot Threats
From Schneier on Security

James Bond Movie-Plot Threats

Amusing post on the plausibility of the evil plans from the various movies.

The Psychology of IT Security Trade-offs
From Schneier on Security

The Psychology of IT Security Trade-offs

Good article. I agree with the conclusion that the solution isn't to convince people to make better choices, but to change the IT architecture so that it's easier...

Classified Information Confetti
From Schneier on Security

Classified Information Confetti

Some of the confetti at the Macy's Thanksgiving Day Parade in New York consisted of confidential documents from the Nassau County Police Department, shredded sideways...

Hackback
From Schneier on Security

Hackback

Stewart Baker, Orin Kerr, and Eugene Volokh on the legality of hackback.

<i>Liars and Outliers</i> Ebook 50% Off and DRM-Free
From Schneier on Security

Liars and Outliers Ebook 50% Off and DRM-Free

Today only, O'Reilly is offering 50% off all its ebooks, including Liars and Outliers. This is probably the cheapest you'll find a DRM-free copy of the book.

Homeland Security Essay Contest
From Schneier on Security

Homeland Security Essay Contest

The Naval Postgraduate School's Center for Homeland Defense and Security is running its sixth annual essay competition. There are cash prizes. (Info on previous...

Friday Squid Blogging: Another Squid Comic
From Schneier on Security

Friday Squid Blogging: Another Squid Comic

Another squid comic. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

Preventing Catastrophic Threats
From Schneier on Security

Preventing Catastrophic Threats

"Recommendations to Prevent Catastrophic Threats." Federation of American Scientists, 9 November 2012. It's twelve specific sets of recommendations for twelvethis...

Cell Phone Surveillance
From Schneier on Security

Cell Phone Surveillance

Good article on the different ways the police can eavesdrop on cell phone calls.

Decrypting a Secret Society's Documents from the 1740s
From Schneier on Security

Decrypting a Secret Society's Documents from the 1740s

Great story, both the cryptanalysis process and the Oculists.

Anonymous Claims it Sabotaged Rove Election Hacking
From Schneier on Security

Anonymous Claims it Sabotaged Rove Election Hacking

Can anyone make heads or tails of this story? (More links.) For my part, I'd like a little -- you know -- evidence. Remember that Ohio was not the deciding state...

E-Mail Security in the Wake of Petraeus
From Schneier on Security

E-Mail Security in the Wake of Petraeus

I've been reading lots of articles articles discussing how little e-mail and Internet privacy we actually have in the U.S. This is a good one to start with: The...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account