acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Liars and Outliers: The Big Idea
From Schneier on Security

Liars and Outliers: The Big Idea

My big idea is a big question. Every cooperative system contains parasites. How do we ensure that society's parasites don't destroy society's systems? It's all...

GPS Spoofers
From Schneier on Security

GPS Spoofers

Great movie-plot threat: Financial institutions depend on timing that is accurate to the microsecond on a global scale so that stock exchanges in, say, London...

State Department Redacts Wikileaks Cables
From Schneier on Security

State Department Redacts Wikileaks Cables

The ACLU filed a FOIA request for a bunch of cables that Wikileaks had already released complete versions of. This is what happened: The agency released redacted...

Detect Which Social Networking Sites Website Visitors Are Logged Into
From Schneier on Security

Detect Which Social Networking Sites Website Visitors Are Logged Into

Clever hack.

FBI Special Agent and Counterterrorism Expert Criticizes the TSA
From Schneier on Security

FBI Special Agent and Counterterrorism Expert Criticizes the TSA

Good essay. Nothing I haven't said before, but it's good to hear it from someone with a widely different set of credentials than I have.

"Cyberwar Is the New Yellowcake"
From Schneier on Security

"Cyberwar Is the New Yellowcake"

Good essay on the dangers of cyberwar rhetoric -- and the cyberwar arms race.

<i>Liars and Outliers</i>: Interview on The Browser
From Schneier on Security

Liars and Outliers: Interview on The Browser

I was asked to talk about five books related to privacy. You're best known as a security expert but our theme today is "trust". How would you describe the connection...

U.S. Federal Court Rules that it is Unconstitutional for the Police to Force Someone to Decrypt their Laptop
From Schneier on Security

U.S. Federal Court Rules that it is Unconstitutional for the Police to Force Someone to Decrypt their Laptop

A U.S. Federal Court aruled that it is unconstitutional for the police to force someone to decrypt their laptop computer: Thursday

Friday Squid Blogging: Squid Can Fly to Save Energy
From Schneier on Security

Friday Squid Blogging: Squid Can Fly to Save Energy

There's a new study that shows that squid are faster in the air than in the water. Squid of many species have been seen to 'fly' using the same jet-propulsion...

<I>Liars and Outliers</i> News
From Schneier on Security

Liars and Outliers News

The book is selling well. (Signed copies are still available on the website.) All the online stores have it, and most bookstores as well. It is available inavailable...

Press Mentions
From Schneier on Security

Press Mentions

One article on me, and a podcast about my RSA talk next week.

Mention of Cryptography in a Rap Song
From Schneier on Security

Mention of Cryptography in a Rap Song

The new movie Safe House features the song "No Church in the Wild," by Kanye West, which includes this verse: I live by you, desire I stand by you, walk through...

Computer Security when Traveling to China
From Schneier on Security

Computer Security when Traveling to China

Interesting: When Kenneth G. Lieberthal, a China expert at the Brookings Institution, travels to that country, he follows a routine that seems straight from a...

Another Piece of the Stuxnet Puzzle
From Schneier on Security

Another Piece of the Stuxnet Puzzle

We can now conclusively link Stuxnet to the centrifuge structure at the Natanz nuclear enrichment lab in Iran. Watch this new video presentation from Ralph Langner...

Mobile Malware Is Increasing
From Schneier on Security

Mobile Malware Is Increasing

According to a report by Juniper, mobile malware is increasing dramatically. In 2011, we saw unprecedented growth of mobile malware attacks with a 155 percentstory...

John Nash's 1955 Letter to the NSA
From Schneier on Security

John Nash's 1955 Letter to the NSA

Fascinating.

"1234" and Birthdays Are the Most Common PINs
From Schneier on Security

"1234" and Birthdays Are the Most Common PINs

Research paper: "A birthday present every eleven wallets? The security of customer-chosen banking PINs," by Joseph Bonneau, Sören Preibusch, and Ross Anderson:...

Covert Communications Channel in Tarsiers
From Schneier on Security

Covert Communications Channel in Tarsiers

Marissa A. Ramsier, Andrew J. Cunningham, Gillian L. Moritz, James J. Finneran, Cathy V. Williams, Perry S. Ong, Sharon L. Gursky-Doyen, and Nathaniel J. Dominy...

Friday Squid Blogging: Squid Desk Lamp
From Schneier on Security

Friday Squid Blogging: Squid Desk Lamp

Beautiful sculpture. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

What Is a Suspicious-Looking Package, Anyway?
From Schneier on Security

What Is a Suspicious-Looking Package, Anyway?

Funny comic.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account