acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Fear-Mongering at TED
From Schneier on Security

Fear-Mongering at TED

This TED talk trots out the usual fear-mongering that technology leads to terrorism. The facts are basically correct, but there are no counterbalancing facts,...

Detroit Bomb Threats
From Schneier on Security

Detroit Bomb Threats

There have been a few hoax bomb threats in Detroit recently (Windsor tunnel, US-Canada bridge, Tiger Stadium). The good news is that police learned; during the...

Friday Squid Blogging: Tentacle Doorstop
From Schneier on Security

Friday Squid Blogging: Tentacle Doorstop

Now this is neat. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

<i>Liars and Outliers</i> Summed Up in Two Comic Strips
From Schneier on Security

Liars and Outliers Summed Up in Two Comic Strips

I don't know the context, but these strips sum up my latest book nicely.

Criminals Using Commercial Spamflooding Services
From Schneier on Security

Criminals Using Commercial Spamflooding Services

Cybercriminals are using commercial spamflooding services to distract their victims during key moments of a cyberattack. Clever, but in retrospect kind of obvious...

Police Sting Operation Yields No Mobile Phone Thefts
From Schneier on Security

Police Sting Operation Yields No Mobile Phone Thefts

Police in Hastings, in the UK, outfitted mobile phones with tracking devices and left them in bars and restaurants, hoping to catch mobile phone thieves in thestole...

Making Handcuff Keys with 3D Printers
From Schneier on Security

Making Handcuff Keys with 3D Printers

Handcuffs pose a particular key management problem. Officers need to be able to unlock handcuffs locked by another officer, so they're all designed to be opened...

Implicit Passwords
From Schneier on Security

Implicit Passwords

This is a really interesting research paper (article here) on implicit passwords: something your unconscious mind remembers but your conscious mind doesn't know...

How the Norwegians Reacted to Terrorism
From Schneier on Security

How the Norwegians Reacted to Terrorism

An antidote to the American cycle of threat, fear, and overspending in response to terrorism is this, about Norway on the first anniversary of its terrorist massacre...

Friday Squid Blogging: Preserved Squid
From Schneier on Security

Friday Squid Blogging: Preserved Squid

Science or art? As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

Camera-Transparent Plastic
From Schneier on Security

Camera-Transparent Plastic

I just wrote about the coming age of invisible surveillance. Here's another step along that process. The material is black in color and cannot be seen through...

Chinese Airline Rewards Crew for Resisting Hijackers
From Schneier on Security

Chinese Airline Rewards Crew for Resisting Hijackers

Normally, companies instruct their employees not to resist. But Hainan Airlines did the opposite: Two safety officers and the chief purser got cash and property...

Remote Scanning Technology
From Schneier on Security

Remote Scanning Technology

I don't know if this is real or fantasy: Within the next year or two, the U.S. Department of Homeland Security will instantly know everything about your body,remote...

Friday Squid Blogging: Barbecued Squid -- New Summer Favorite
From Schneier on Security

Friday Squid Blogging: Barbecued Squid -- New Summer Favorite

In the UK, barbecued squid is in: Sales of squid have tripled in recent months due to the growing popularity of Mediterranean food and the rise of the Dukan diet...

Hacking BMW's Remote Keyless Entry System
From Schneier on Security

Hacking BMW's Remote Keyless Entry System

It turns out to be surprisingingly easy: The owner, who posted the video at 1addicts.com, suspects the thieves broke the glass to access the BMW's on-board diagnostics...

All-or-Nothing Access Control for Mobile Phones
From Schneier on Security

All-or-Nothing Access Control for Mobile Phones

This paper looks at access control for mobile phones. Basically, it's all or nothing: either you have a password that protects everything, or you have no password...

Dropped USB Sticks in Parking Lot as Actual Attack Vector
From Schneier on Security

Dropped USB Sticks in Parking Lot as Actual Attack Vector

For years, it's been a clever trick to drop USB sticks in parking lots of unsuspecting businesses, and track how many people plug them into computers. I have long...

Petition the U.S. Government to Force the TSA to Follow the Law
From Schneier on Security

Petition the U.S. Government to Force the TSA to Follow the Law

This is important: In July 2011, a federal appeals court ruled that the Transportation Security Administration had to conduct a notice-and-comment rulemaking on...

Cryptanalyze the Agrippa Code
From Schneier on Security

Cryptanalyze the Agrippa Code

William Gibson's Grippa Code is available for cryptanalysis. Break the code, win a prize.

Attacking Fences
From Schneier on Security

Attacking Fences

From an article on the cocaine trade between Mexico and the U.S.: "They erect this fence," he said, "only to go out there a few days later and discover that these...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account