acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Lessons in Trust from Web Hoaxes
From Schneier on Security

Lessons in Trust from Web Hoaxes

Interesting discussion of trust in this article on web hoaxes. Kelly's students, like all good con artists, built their stories out of small, compelling details...

Privacy Concerns Around "Social Reading"
From Schneier on Security

Privacy Concerns Around "Social Reading"

Interesting paper: "The Perils of Social Reading," by Neil M. Richards, from the Georgetown Law Journal. Abstract: Our law currently treats records of our reading...

Racism as a Vestigal Remnant of a Security Mechanism
From Schneier on Security

Racism as a Vestigal Remnant of a Security Mechanism

"Roots of Racism," by Elizabeth Culotta in Science: Our attitudes toward outgroups are part of a threat-detection system that allows us to rapidly determine friend...

Security Incentives and Advertising Fraud
From Schneier on Security

Security Incentives and Advertising Fraud

Details are in the article, but here's the general idea: Let's follow the flow of the users: Scammer buys user traffic from PornoXo.com and sends it to HQTubeVideos...

Portrait of a Counterfeiter
From Schneier on Security

Portrait of a Counterfeiter

Interesting article from Wired.

Friday Squid Blogging: Squid Scalp Massager
From Schneier on Security

Friday Squid Blogging: Squid Scalp Massager

Cheap! As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

Kip Hawley Reviews <i>Liars and Outliers</i>
From Schneier on Security

Kip Hawley Reviews Liars and Outliers

In his blog: I think the most important security issues going forward center around identity and trust. Before knowing I would soon encounter Bruce again in the...

Cybersecurity at the Doctor's Office
From Schneier on Security

Cybersecurity at the Doctor's Office

I like this essay because it nicely illustrates the security mindset.

<i>Rules for Radicals</i>
From Schneier on Security

Rules for Radicals

It was written in 1971, but this still seems like a cool book: For an elementary illustration of tactics, take parts of your face as the point of reference; your...

USB Drives and Wax Seals
From Schneier on Security

USB Drives and Wax Seals

Need some pre-industrial security for your USB drive? How about a wax seal? Neat, but I recommend combining it with encryption for even more security!

Security Vulnerabilities in Airport Full-Body Scanners
From Schneier on Security

Security Vulnerabilities in Airport Full-Body Scanners

According to a report from the DHS Office of Inspector General: Federal investigators "identified vulnerabilities in the screening process" at domestic airports...

U.S. Exports Terrorism Fears
From Schneier on Security

U.S. Exports Terrorism Fears

To New Zealand: United States Secretary of Homeland Security Janet Napolitano has warned the New Zealand Government about the latest terrorist threat known as...

The Trouble with Airport Profiling
From Schneier on Security

The Trouble with Airport Profiling

Why do otherwise rational people think it's a good idea to profile people at airports? Recently, neuroscientist and best-selling author Sam Harris related a story...

Friday Squid Blogging: New Book on Squid
From Schneier on Security

Friday Squid Blogging: New Book on Squid

Kraken: The Curious, Exciting, and Slightly Disturbing Science of Squid. And a review. As usual, you can also use this squid post to talk about the security stories...

Smart Phone Privacy App
From Schneier on Security

Smart Phone Privacy App

MobileScope looks like a great tool for monitoring and controlling what information third parties get from your smart phone apps: We built MobileScope as a proof...

Security Fail
From Schneier on Security

Security Fail

Funny.

RuggedCom Inserts Backdoor into Its Products
From Schneier on Security

RuggedCom Inserts Backdoor into Its Products

All RuggedCom equipment comes with a built-in backdoor: The backdoor, which cannot be disabled, is found in all versions of the Rugged Operating System made by...

A Foiled Terrorist Plot
From Schneier on Security

A Foiled Terrorist Plot

We don't know much, but here are my predictions: There's a lot more hyperbole to this story than reality. The explosive would have either 1) been caught by pre...

Overreacting to Potential Bombs
From Schneier on Security

Overreacting to Potential Bombs

This is a ridiculous overreaction: The police bomb squad was called to 2 World Financial Center in lower Manhattan at midday when a security guard reported a package...

Naval Drones
From Schneier on Security

Naval Drones

With all the talk about airborne drones like the Predator, it's easy to forget that drones can be in the water as well. Meet the Common Unmanned Surface Vessel...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account