acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Hacking Critical Infrastructure
From Schneier on Security

Hacking Critical Infrastructure

A otherwise uninteresting article on Internet threats to public infrastructure contains this paragraph: At a closed-door briefing, the senators were shown howtake...

Avi Rubin on Computer Security
From Schneier on Security

Avi Rubin on Computer Security

Avi Rubin has a TEDx talk on hacking various computer devices: medical devices, automobiles, police radios, smart phones, etc.

Australian Security Theater
From Schneier on Security

Australian Security Theater

I like the quote at the end of this excerpt: Aviation officials have questioned the need for such a strong permanent police presence at airports, suggesting they...

Friday Squid Blogging: Squid-Shaped USB Drive
From Schneier on Security

Friday Squid Blogging: Squid-Shaped USB Drive

It looks great. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

BitCoin Security Musings
From Schneier on Security

BitCoin Security Musings

Jon Callas talks about BitCoin's security model, and how susceptible it would be to a Goldfinger-style attack (destroy everyone else's BitCoins).

Non-Lethal Heat Ray
From Schneier on Security

Non-Lethal Heat Ray

The U.S. military has a non-lethal heat ray. No details on what "non-lethal" means in this context.

Assorted Schneier News Stories
From Schneier on Security

Assorted Schneier News Stories

I have several stories in the news (and one podcast), mostly surrounding the talks I gave at the RSA Conference last month.

More "Liars and Outliers" Links
From Schneier on Security

More "Liars and Outliers" Links

First, five new reviews of the book. Second, four new AV interviews about the book. Third, I take the Page 99 Test.

On Cyberwar Hype
From Schneier on Security

On Cyberwar Hype

Good article by Thomas Rid on the hype surrounding cyberwar. It's well worth reading. And in a more academic paper, published in the RUSI Journal, Thomas Ridgeneric...

A Negative <i>Liars and Outliers</i> Review
From Schneier on Security

A Negative Liars and Outliers Review

Ths person didn't like it at all. It'll go up on the book's webpage, along with all the positive reviews.

The Security of Multi-Word Passphrases
From Schneier on Security

The Security of Multi-Word Passphrases

Interesting research on the security of passphrases. From a blog post on the work: We found about 8,000 phrases using a 20,000 phrase dictionary. Using a very...

Video Shows TSA Full-Body Scanner Failure
From Schneier on Security

Video Shows TSA Full-Body Scanner Failure

The Internet is buzzing about this video, showing a blogger walking through two different types of full-body scanners with metal objects. Basically, by placing...

Jamming Speech with Recorded Speech
From Schneier on Security

Jamming Speech with Recorded Speech

This is cool: The idea is simple. Psychologists have known for some years that it is almost impossible to speak when your words are replayed to you with a delay...

Friday Squid Blogging: Humboldt Squid Can Dive to 1.5 km
From Schneier on Security

Friday Squid Blogging: Humboldt Squid Can Dive to 1.5 km

Yet another impressive Humboldt squid feat: "We've seen them make really impressive dives up to a kilometre and a half deep, swimming straight through a zone where...

<i>Liars and Outliers</i>: Book Excerpt
From Schneier on Security

Liars and Outliers: Book Excerpt

Gizmodo published the beginning of Chapter 17: the last chapter.

Cloud Computing As a Man-in-the-Middle Attack
From Schneier on Security

Cloud Computing As a Man-in-the-Middle Attack

This essay uses the interesting metaphor of the man-in-the-middle attacker to describe cloud providers like Facebook and Google. Basically, they get in the middle...

NSA's Secure Android Spec
From Schneier on Security

NSA's Secure Android Spec

The NSA has released its specification for a secure Android. One of the interesting things it's requiring is that all data be tunneled through a secure VPN: Inter...

How Changing Technology Affects Security
From Schneier on Security

How Changing Technology Affects Security

Security is a tradeoff, a balancing act between attacker and defender. Unfortunately, that balance is never static. Changes in technology affect both sides. Society...

The Keywords the DHS Is Using to Analyze Your Social Media Posts
From Schneier on Security

The Keywords the DHS Is Using to Analyze Your Social Media Posts

According to this document, received by EPIC under the Freedom of Information Act, the U.S. Department of Homeland Security is combing through the gazillions of...

Comic: Movie Hacking vs. Real Hacking
From Schneier on Security

Comic: Movie Hacking vs. Real Hacking

Funny.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account