acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Recovering a Hacked Gmail Account
From Schneier on Security

Recovering a Hacked Gmail Account

Long (but well-written and interesting) story of someone whose Gmail account was hacked and erased, and eventually restored. Many interesting lessons about the...

"Going Dark" vs. a "Golden Age of Surveillance"
From Schneier on Security

"Going Dark" vs. a "Golden Age of Surveillance"

It's a policy debate that's been going on since the crypto wars of the early 1990s. The FBI, NSA, and other agencies continue to claim they're losing their ability...

Abolish the Department of Homeland Security
From Schneier on Security

Abolish the Department of Homeland Security

I have a love/hate relationship with the CATO Institute. Most of their analysis I strongly disagree with, but some of it I equally strongly agree with. Last September...

TSA Cupcake Update
From Schneier on Security

TSA Cupcake Update

The TSA claims that the cupcake they confiscated was in a jar. So this is a less obviously stupid story than I previously thought.

A Theory of Online Jihadist Sites
From Schneier on Security

A Theory of Online Jihadist Sites

Very interesting: The counterterrorism community has spent years trying to determine why so many people are engaged in online jihadi communities in such a meaningful...

Apple Split-Key Patent
From Schneier on Security

Apple Split-Key Patent

Apple has a patent on splitting a key between a portable device and its power supply. Clever idea.

Protecting Your Privacy at International Borders
From Schneier on Security

Protecting Your Privacy at International Borders

The EFF has published a good guide. My own advice is here and here.

Collecting Expert Predictions about Terrorist Attacks
From Schneier on Security

Collecting Expert Predictions about Terrorist Attacks

John Mueller has been collecting them: Some 116 of these Very People were surveyed in 2006 by Foreign Policy magazine in a joint project with the Center for America...

Stealing Source Code
From Schneier on Security

Stealing Source Code

Hackers stole some source code to Symantec's products. We don't know what was stolen or how recent the code is -- the company is, of course, minimizing the story...

The TSA Proves its Own Irrelevance
From Schneier on Security

The TSA Proves its Own Irrelevance

Have you wondered what $1.2 billion in airport security gets you? The TSA has compiled its own "Top 10 Good Catches of 2011": 10) Snakes, turtles, and birds were...

Friday Squid Blogging: Squid Skateboards
From Schneier on Security

Friday Squid Blogging: Squid Skateboards

Great designs..

Time to Patch Your HP Printers
From Schneier on Security

Time to Patch Your HP Printers

It's a serious vulnerability. Note that this is the research that was mistakenly reported as allowing hackers to set your printer on fire. Here's a list of all...

Improving the Security of Four-Digit PINs on Cell Phones
From Schneier on Security

Improving the Security of Four-Digit PINs on Cell Phones

The author of this article notices that it's often easy to guess a cell phone PIN because of smudge marks on the screen. Those smudge marks indicate the four PIN...

<i>Liars and Outliers</i> News
From Schneier on Security

Liars and Outliers News

The Liars and Outliers webpage is live. On it you can find links to order both paper and e-book copies from a variety of online retailers, and signed copies directly...

Newly Released Papers from NSA Journals
From Schneier on Security

Newly Released Papers from NSA Journals

The papers are old, but they have just been released under FOIA.

Sending Coded Messages with Postage Stamps
From Schneier on Security

Sending Coded Messages with Postage Stamps

The history of coded messages in postage-stamp placement. I wonder how prevalent this actually was. My guess is that it was more a clever idea than an actual...

Allocating Security Resources to Protect Critical Infrastructure
From Schneier on Security

Allocating Security Resources to Protect Critical Infrastructure

Alan T. Murray and Tony H. Grubesic, "Critical Infrastructure Protection: The Vulnerability Conundrum," Telematics & Informatics, 29 (February 2012): 56

Applying Game Theory to Cyberattacks and Defenses
From Schneier on Security

Applying Game Theory to Cyberattacks and Defenses

Behzad Zare Moayedi, Mohammad Abdollahi Azgomi, "A Game Theoretic Framework for Evaluation of the Impacts of Hackers Diversity on Security Measures," Reliability...

Studying Airport Security
From Schneier on Security

Studying Airport Security

Alan A. Kirschenbaum, Michele Mariani, Coen Van Gulijk, Sharon Lubasz, Carmit Rapaport, and Hinke Andriessen, "Airport Security: An Ethnographic Study," Journal...

Tying Up Phone Lines as a Cyberattack Tactic
From Schneier on Security

Tying Up Phone Lines as a Cyberattack Tactic

There's a service that can be hired to tie up target phone lines indefinitely. The article talks about how this can be used as a diversionary tactic to mask a...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account