acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Termite Suicide Bombers
From Schneier on Security

Termite Suicide Bombers

Some termites blow themselves up to expel invaders from their nest.

11-Year-Old Bypasses Airport Security
From Schneier on Security

11-Year-Old Bypasses Airport Security

Sure, stories like this are great fun, but I don't think it's much of a security concern. Terrorists can't build a plot around random occasional security failures...

<i>Rolling Stone</i> Magazine Writes About Computer Security
From Schneier on Security

Rolling Stone Magazine Writes About Computer Security

It's a virus that plays AC/DC, so it makes sense. Surreal, though. Another article.

Detecting Spoofed GPS Signals
From Schneier on Security

Detecting Spoofed GPS Signals

This is the latest in the arms race between spoofing GPS signals and detecting spoofed GPS signals. Unfortunately, the countermeasures all seem to be patent pending...

Chinese Gang Sells Fake Professional Certifications
From Schneier on Security

Chinese Gang Sells Fake Professional Certifications

They were able to hack into government websites: The gang’s USP, and the reason it could charge up to 10,000 yuan (£1,000) per certificate, was that it could hack...

Yet Another Risk of Storing Everything in the Cloud
From Schneier on Security

Yet Another Risk of Storing Everything in the Cloud

A hacker can social-engineer his way into your cloud storageand delete everything you have. It turns out, a billing address and the last four digits of a credit...

Peter Swire Testifies on the Inadequacy of Privacy Self-Regulation
From Schneier on Security

Peter Swire Testifies on the Inadequacy of Privacy Self-Regulation

Ohio State University Law Professor Peter Swire testifies before Congress on the inadequacy of industry self-regulation to protect privacy.

Verifying Elections Using Risk-Limiting Auditing
From Schneier on Security

Verifying Elections Using Risk-Limiting Auditing

Interesting article on using risk-limiting auditing in determining if an election's results are likely to be valid. The risk, in this case, is in the chance of...

Breaking Microsoft's PPTP Protocol
From Schneier on Security

Breaking Microsoft's PPTP Protocol

Some things never change. Thirteen years ago, Mudge and I published a paper breaking Microsoft's PPTP protocol and the MS-CHAP authentication system. I haven't...

State-by-State Report on Electronic Voting
From Schneier on Security

State-by-State Report on Electronic Voting

The Verified Voting Foundation has released a comprehensive state-by-state report on electronic voting machines (report, executive summary, and news coverage)....

Friday Squid Blogging: SQUIDS and Quantum Computing
From Schneier on Security

Friday Squid Blogging: SQUIDS and Quantum Computing

It seems that quantum computers might use superconducting quantum interference devices (SQUIDs). As usual, you can also use this squid post to talk about the security...

Unsafe Safes
From Schneier on Security

Unsafe Safes

In a long article about insecurities in gun safes, there's this great paragraph: Unfortunately, manufacturers and consumers are deceived and misled into a false...

Overreaction and Overly Specific Reactions to Rare Risks
From Schneier on Security

Overreaction and Overly Specific Reactions to Rare Risks

Horrific events, such as the massacre in Aurora, can be catalysts for social and political change. Sometimes it seems that they're the only catalyst; recall how...

Court Orders TSA to Answer EPIC
From Schneier on Security

Court Orders TSA to Answer EPIC

Year ago, EPIC sued the TSA over full body scanners (I was one of the plantiffs), demanding that they follow their own rules and ask for public comment. The court...

Hotel Door Lock Vulnerability
From Schneier on Security

Hotel Door Lock Vulnerability

The attack only works sometimes, but it does allow access to millions of hotel rooms worldwide that are secured by Onity brand locks. Basically, you can read the...

Profile on Eugene Kaspersky
From Schneier on Security

Profile on Eugene Kaspersky

Wired has an interesting and comprehensive profile on Eugene Kaspersky. Especially note Kaspersky Lab's work to uncover US cyberespionage against Iran, Kaspersky's...

Lone Shooters and Body Armor
From Schneier on Security

Lone Shooters and Body Armor

The new thing about the Aurora shooting wasn't the weaponry, but the armor: What distinguished Holmes wasn't his offense. It was his defense. At Columbine, Harris...

On Soft Targets
From Schneier on Security

On Soft Targets

Stratfor has an interesting article.

Fake Irises Fool Scanners
From Schneier on Security

Fake Irises Fool Scanners

We already know you can wear fake irises to fool a scanner into thinking you're not you, but this is the first fake iris you can use for impersonation: to fool...

Hacking Tool Disguised as a Power Strip
From Schneier on Security

Hacking Tool Disguised as a Power Strip

This is impressive: The device has Bluetooth and Wi-Fi adapters, a cellular connection, dual Ethernet ports, and hacking and remote access tools that let security...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account