acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

TSA Behavioral Detection Statistics
From Schneier on Security

TSA Behavioral Detection Statistics

Interesting data from the U.S. Government Accounting Office: But congressional auditors have questions about other efficiencies as well, like having 3,000 "behavior...

Dance Moves As an Identifier
From Schneier on Security

Dance Moves As an Identifier

A burglar was identified by his dance moves, captured on security cameras: "The 16-year-old juvenile suspect is known for his 'swag,' or signature dance move,"...

Smart Meter Hacks
From Schneier on Security

Smart Meter Hacks

Brian Krebs writes about smart meter hacks: But it appears that some of these meters are smarter than others in their ability to deter hackers and block unauthorized...

Password Security at Linode
From Schneier on Security

Password Security at Linode

Here's something good: We have implemented sophisticated brute force protection for Linode Manager user accounts that combines a time delay on failed attempts,...

Stolen Phone Database
From Schneier on Security

Stolen Phone Database

This article talks about a database of stolen cell phone IDs that will be used to deny service. While I think this is a good idea, I don't know how much it would...

Forever-Day Bugs
From Schneier on Security

Forever-Day Bugs

That's a nice turn of phrase: Forever day is a play on "zero day," a phrase used to classify vulnerabilities that come under attack before the responsible manufacturer...

Outliers in Intelligence Analysis
From Schneier on Security

Outliers in Intelligence Analysis

From the CIA journal Studies in Intelligence: "Capturing the Potential of Outlier Ideas in the Intelligence Community." In war you will generally find that the...

Hawley Channels His Inner Schneier
From Schneier on Security

Hawley Channels His Inner Schneier

Kip Hawley wrote an essay for the Wall Street Journal on airport security. In it, he says so many sensible things that people have been forwarding it to me with...

How Information Warfare Changes Warfare
From Schneier on Security

How Information Warfare Changes Warfare

Really interesting paper on the moral and ethical implications of cyberwar, and the use of information technology in war (drones, for example): "Information Warfare...

Friday Squid Blogging: Squid Fiction
From Schneier on Security

Friday Squid Blogging: Squid Fiction

Great short story in Nature. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

Me at RSA 2012
From Schneier on Security

Me at RSA 2012

This is not a video of my talk at the RSA Conference earlier this year. This is a 16-minute version of that talk -- TED-like -- that the conference filmed the...

Disguising Tor Traffic as Skype Video Calls
From Schneier on Security

Disguising Tor Traffic as Skype Video Calls

One of the problems with Tor traffic is that it can de detected and blocked. Here's SkypeMorph, a clever system that disguises Tor traffic as Skype video traffic...

Bomb Threats As a Denial-of-Service Attack
From Schneier on Security

Bomb Threats As a Denial-of-Service Attack

The University of Pittsburgh has been the recipient of 50 bomb threats in the past two months (over 30 during the last week). Each time, the university evacuates...

Brian Snow on Cybersecurity
From Schneier on Security

Brian Snow on Cybersecurity

Interesting video of Brian Snow speaking from last November. (Brian used to be the Technical Director of NSA's Information Assurance Directorate.) About a year...

"Raise the Crime Rate"
From Schneier on Security

"Raise the Crime Rate"

I read this a couple of months ago, and I'm still not sure what I think about it. It's definitely of the most thought-provoking essays I've read this year. According...

A Heathrow Airport Story about Trousers
From Schneier on Security

A Heathrow Airport Story about Trousers

Usually I don't bother posting random stories about dumb or inconsistent airport security measures. But this one is particularly interesting: "Sir, your trousers...

Teenagers and Privacy
From Schneier on Security

Teenagers and Privacy

Good article debunking the myth that young people don't care about privacy on the Intenet. Most kids are well aware of risks, and make "fairly sophisticated" decisions...

Laptops and the TSA
From Schneier on Security

Laptops and the TSA

The New York Times tries to make sense of the TSA's policies on computers. Why do you have to take your tiny laptop out of your bag, but not your iPad? Their...

Friday Squid Blogging: Squid Art
From Schneier on Security

Friday Squid Blogging: Squid Art

Happy Easter. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

A Systems Framework for Catastrophic Disaster Response
From Schneier on Security

A Systems Framework for Catastrophic Disaster Response

The National Academies Press has published Crisis Standards of Care: A Systems Framework for Catastrophic Disaster Response. When a nation or region prepares...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account