acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

The Battle for Internet Governance
From Schneier on Security

The Battle for Internet Governance

Good article on the current battle for Internet governance: The War for the Internet was inevitable -- a time bomb built into its creation. The war grows out of...

Lost Smart Phones and Human Nature
From Schneier on Security

Lost Smart Phones and Human Nature

Symantec deliberately "lost" a bunch of smart phones with tracking software on them, just to see what would happen: Some 43 percent of finders clicked on an app...

Law Enforcement Forensics Tools Against Smart Phones
From Schneier on Security

Law Enforcement Forensics Tools Against Smart Phones

Turns out the password can be easily bypassed: XRY works by first jailbreaking the handset. According to Micro Systemation, no

Computer Forensics: An Example
From Schneier on Security

Computer Forensics: An Example

Paul Ceglia's lawsuit against Facebook is fascinating, but that's not the point of this blog post. As part of the case, there are allegations that documents and...

Buying Exploits on the Grey Market
From Schneier on Security

Buying Exploits on the Grey Market

This article talks about legitimate companies buying zero-day exploits, including the fact that "an undisclosed U.S. government contractor recently paid $250,000...

Friday Squid Blogging: How Squid Hear
From Schneier on Security

Friday Squid Blogging: How Squid Hear

Interesting research: The squid use two closely spaced organs called statocysts to sense sound. "I think of a statocyst as an inside-out tennis ball," explains...

Summer Schools in Cryptography and Software Security at Penn State
From Schneier on Security

Summer Schools in Cryptography and Software Security at Penn State

Normally I just delete these as spam, but this summer program for graduate students 1) looks interesting, and 2) has some scholarship money available.

Harms of Post-9/11 Airline Security
From Schneier on Security

Harms of Post-9/11 Airline Security

As I posted previously, I have been debating former TSA Administrator Kip Hawley on the Economist website. I didn't bother reposting my opening statement and rebuttal...

SHARCS Conference
From Schneier on Security

SHARCS Conference

Last weekend was the 2012 SHARCS (Special-Purpose Hardware for Attacking Cryptographic Systems) conference. The presentations are online.

The Effects of Data Breach Litigation
From Schneier on Security

The Effects of Data Breach Litigation

"Empirical Analysis of Data Breach Litigation," Sasha Romanosky, David Hoffman, and Alessandro Acquisti: Abstract: In recent years, a large number of data breaches...

Congressional Testimony on the TSA
From Schneier on Security

Congressional Testimony on the TSA

I was supposed to testify today about the TSA in front of the House Committee on Oversight and Government Reform. I was informally invited a couple of weeks ago...

Rare Spanish Enigma Machine
From Schneier on Security

Rare Spanish Enigma Machine

This is a neat story: A pair of rare Enigma machines used in the Spanish Civil War have been given to the head of GCHQ, Britain's communications intelligence agency...

Friday Squid Blogging: Giant Squid Eyes
From Schneier on Security

Friday Squid Blogging: Giant Squid Eyes

It seems that the huge eyes of the giant squid are optimized to see sperm whales.

<i>The Economist</i> Debate on Airplane Security
From Schneier on Security

The Economist Debate on Airplane Security

On The Economist website, I am currently debating Kip Hawley on airplane security. On Tuesday we posted our initial statements, and today (London time) we posted...

Can the NSA Break AES?
From Schneier on Security

Can the NSA Break AES?

In an excellent article in Wired, James Bamford talks about the NSA's codebreaking capability. According to another top official also involved with the program...

Another <i>Liars and Outliers</i> Excerpt
From Schneier on Security

Another Liars and Outliers Excerpt

IT World published an excerpt from Chapter 4.

Unprinter
From Schneier on Security

Unprinter

A way to securely erase paper: "The key idea was to find a laser energy level that is high enough to ablate - or vaporise - the toner that at the same time isNew...

Hacking Critical Infrastructure
From Schneier on Security

Hacking Critical Infrastructure

A otherwise uninteresting article on Internet threats to public infrastructure contains this paragraph: At a closed-door briefing, the senators were shown howtake...

Avi Rubin on Computer Security
From Schneier on Security

Avi Rubin on Computer Security

Avi Rubin has a TEDx talk on hacking various computer devices: medical devices, automobiles, police radios, smart phones, etc.

Australian Security Theater
From Schneier on Security

Australian Security Theater

I like the quote at the end of this excerpt: Aviation officials have questioned the need for such a strong permanent police presence at airports, suggesting they...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account