acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Resilience
From Schneier on Security

Resilience

There was a conference on resilience (highlights here, and complete videos here) earlier this year. Here's an interview with professor Sander van der Leeuw on...

Op-ed Explaining why Terrorism Doesn't Work
From Schneier on Security

Op-ed Explaining why Terrorism Doesn't Work

Good essay by Max Abrams. I've written about his research before.

Friday Squid Blogging: Giant Mutant Squid at the Queen's Jubilee
From Schneier on Security

Friday Squid Blogging: Giant Mutant Squid at the Queen's Jubilee

I think this is a parody, but you can never be sure. Millions of Britons turned out for the Queen

Colbert Report on the Orangutan Cyberthreat
From Schneier on Security

Colbert Report on the Orangutan Cyberthreat

Very funny video expos

Economic Analysis of Bank Robberies
From Schneier on Security

Economic Analysis of Bank Robberies

Yes, it's clever: The basic problem is the average haul from a bank job: for the three-year period, it was only

Far-Fetched Scams Separate the Gullible from Everyone Else
From Schneier on Security

Far-Fetched Scams Separate the Gullible from Everyone Else

Interesting conclusion by Cormac Herley, in this paper: "Why Do Nigerian Scammers Say They are From Nigeria?" Abstract: False positives cause many promising detection...

Apple Patents Data-Poisoning
From Schneier on Security

Apple Patents Data-Poisoning

It's not a new idea, but Apple Computer has received a patent on "Techniques to pollute electronic profiling": Abstract: Techniques to pollute electronic profiling...

Switzerland National Defense
From Schneier on Security

Switzerland National Defense

Interesting blog post about this book about Switzerland's national defense. To make a long story short, McPhee describes two things: how Switzerland requires military...

Attack Against Point-of-Sale Terminal
From Schneier on Security

Attack Against Point-of-Sale Terminal

Clever attack: When you pay a restaurant bill at your table using a point-of-sale machine, are you sure it's legit? In the past three months, Toronto and Peel...

The Failure of Anti-Virus Companies to Catch Military Malware
From Schneier on Security

The Failure of Anti-Virus Companies to Catch Military Malware

Mikko Hyponnen of F-Secure attempts to explain why anti-virus companies didn't catch Stuxnet, DuQu, and Flame: When we went digging through our archive for related...

England's Prince Phillip on Security
From Schneier on Security

England's Prince Phillip on Security

On banning guns: "If a cricketer, for instance, suddenly decided to go into a school and batter a lot of people to death with a cricket bat,which he could do very...

Honor System Farm Stands
From Schneier on Security

Honor System Farm Stands

Many roadside farm stands in the U.S. are unmanned. They work on the honor system: take what you want, and pay what you owe. And today at his farm stand, Cochran...

Friday Squid Blogging: Woman's Mouth Inseminated by Cooked Squid
From Schneier on Security

Friday Squid Blogging: Woman's Mouth Inseminated by Cooked Squid

This story is so freaky I'm not even sure I want to post it. But if I don't, you'll all send me the links. As usual, you can also use this squid post to talk...

FireDogLake Book Salon for <i>Liars and Outliers</i>
From Schneier on Security

FireDogLake Book Salon for Liars and Outliers

On Sunday, I will be participating in a public discussion about my new book on the FireDogLake website. James Fallows will be the moderator, and I will be answering...

Rare Rational Comment on al Qaeda's Capabilities
From Schneier on Security

Rare Rational Comment on al Qaeda's Capabilities

From "CNN national security analyst" Peter Bergen: Few Americans harbor irrational fears about being killed by a lightning bolt. Abu Yahya al-Libi's death on Monday...

Cheating in Online Classes
From Schneier on Security

Cheating in Online Classes

Interesting article: In the case of that student, the professor in the course had tried to prevent cheating by using a testing system that pulled questions at...

Cyberwar Treaties
From Schneier on Security

Cyberwar Treaties

We're in the early years of a cyberwar arms race. It's expensive, it's destabilizing, and it threatens the very fabric of the Internet we use every day. Cyberwar...

Teaching the Security Mindset
From Schneier on Security

Teaching the Security Mindset

In 2008 I wrote about the security mindset and how difficult it is to teach. Two professors teaching a cyberwarfare class gave an exam where they expected their...

High-Quality Fake IDs from China
From Schneier on Security

High-Quality Fake IDs from China

USA Today article: Most troubling to authorities is the sophistication of the forgeries: Digital holograms are replicated, PVC plastic identical to that found...

Israel Demanding Passwords at the Border
From Schneier on Security

Israel Demanding Passwords at the Border

There have been a bunch of stories about employers demanding passwords to social networking sites, like Facebook, from prospective employees, and several states...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account