acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Experimental Results: <i>Liars and Outliers</i> Trust Offer
From Schneier on Security

Experimental Results: Liars and Outliers Trust Offer

Last August, I offered to sell Liars and Outliers for $11 in exchange for a book review. This was much less than the $30 list price; less even than the $16 Amazon...

The Politics and Philosophy of National Security
From Schneier on Security

The Politics and Philosophy of National Security

This essay explains why we're all living in failed Hobbesian states: What do these three implications -- states have a great deal of freedom to determine what...

Denial-of-Service Attack Against Facebook
From Schneier on Security

Denial-of-Service Attack Against Facebook

Just claim the person is dead. All you need to do is fake an online obituary.

Cat Smuggler
From Schneier on Security

Cat Smuggler

Not a cat burglar, a cat smuggler. Guards thought there was something suspicious about a little white cat slipping through a prison gate in northeastern Brazil...

DHS Gets to Spy on Everyone
From Schneier on Security

DHS Gets to Spy on Everyone

This Wall Street Journal investigative piece is a month old, but well worth reading. Basically, the Total Information Awareness program is back with a different...

Details of an Internet Scam
From Schneier on Security

Details of an Internet Scam

Interesting details of an Amazon Marketplace scam. Worth reading. Most scams use a hook to cause a reaction. The idea being that if you are reacting, they get...

Friday Squid Blogging: Giant Squid Finally Captured on Video
From Schneier on Security

Friday Squid Blogging: Giant Squid Finally Captured on Video

We'll see it later this month. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

What Facebook Gives the Police
From Schneier on Security

What Facebook Gives the Police

This is what Facebook gives the police in response to a subpoena. (Note that this isn't in response to a warrant; it's in response to a subpoena.) This might...

Classifying a Shape
From Schneier on Security

Classifying a Shape

This is a great essay: Spheres are special shapes for nuclear weapons designers. Most nuclear weapons have, somewhere in them, that spheres-within-spheres arrangement...

Apollo Robbins, Pickpocket
From Schneier on Security

Apollo Robbins, Pickpocket

Fascianting story: "Come on," Jillette said. "Steal something from me." Again, Robbins begged off, but he offered to do a trick instead. He instructed Jillette...

Terms of Service as a Security Threat
From Schneier on Security

Terms of Service as a Security Threat

After the Instagram debacle, where it changed its terms of service to give itself greater rights over user photos and reversed itself after a user backlash, it's...

Friday Squid Blogging: William Gilly, Squid Researcher
From Schneier on Security

Friday Squid Blogging: William Gilly, Squid Researcher

Good article. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

I Seem to Be a Verb
From Schneier on Security

I Seem to Be a Verb

From "The Insider's TSA Dictionary": Bruce Schneiered: (V, ints) When a passenger uses logic in order to confound and perplex an officer into submission. Ex: "A...

Becoming a Police Informant in Exchange for a Lighter Sentence
From Schneier on Security

Becoming a Police Informant in Exchange for a Lighter Sentence

Fascinating article. Snitching has become so commonplace that in the past five years at least 48,895 federal convicts -- one of every eight -- had their prison...

Breaking Hard-Disk Encryption
From Schneier on Security

Breaking Hard-Disk Encryption

The newly announced ElcomSoft Forensic Disk Decryptor can decrypt BitLocker, PGP, and TrueCrypt. And it's only $300. How does it work? Elcomsoft Forensic Disk...

Public Shaming as a Security Measure
From Schneier on Security

Public Shaming as a Security Measure

In Liars and Outliers, I talk a lot about the more social forms of security. One of them is reputational. This post is about that squishy sociological security...

<i>Cryptography Engineering</i> Available as an eBook
From Schneier on Security

Cryptography Engineering Available as an eBook

Finally, Cryptography Engineering is available as an ebook. Even better, it's today's deal of the day at O'Reilly: $27.50 (50% off) and no copy protection. (The...

Hackers Use Backdoor to Break System
From Schneier on Security

Hackers Use Backdoor to Break System

Industrial control system comes with a backdoor: Although the system was password protected in general, the backdoor through the IP address apparently required...

Peruvian Spider Species Creates Decoys
From Schneier on Security

Peruvian Spider Species Creates Decoys

Clyclosa spiders create decoys to fool predators.

Phishing via Twitter
From Schneier on Security

Phishing via Twitter

Interesting firsthand phishing story: A few nights ago, I got a Twitter direct message (DM) from a friend saying that someone was saying nasty things about me,...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account