acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Hacking Printers and Setting Them on Fire
From Schneier on Security

Hacking Printers and Setting Them on Fire

It's the kind of research result that screams hype, but online attacks that have physical-world consequences are fundamentally a different sort of threat. I suspect...

Walls as Security Theater
From Schneier on Security

Walls as Security Theater

Interesting essay on walls and their effects: Walls, then, are built not for security, but for a sense of security. The distinction is important, as those whoas...

Full-Disk Encryption Works
From Schneier on Security

Full-Disk Encryption Works

According to researchers, full-disk encryption is hampering police forensics. The authors of the report suggest there are some things law enforcement can do, but...

Status Report: <i>Liars and Outliers</i>
From Schneier on Security

Status Report: Liars and Outliers

After a long and hard year, Liars and Outliers is done. I submitted the manuscript to the publisher on Oct 1, got edits back from both an outside editor and a...

Full Disclosure in Biology
From Schneier on Security

Full Disclosure in Biology

The debate over full disclosure in computer security has been going on for the better part of two decades now. The stakes are much higher in biology: The virus...

Bad CIA Operational Security
From Schneier on Security

Bad CIA Operational Security

I have no idea if this story about CIA spies in Lebanon is true, and it will almost certainly never be confirmed or denied: But others inside the American intelligence...

Security Systems as a Marker for High-Value Targets
From Schneier on Security

Security Systems as a Marker for High-Value Targets

If something is protected by heavy security, it's obviously worth stealing. Here's an example from the insect world: Maize plants, like many others, protect themselves...

Shopper Surveillance Using Cell Phones
From Schneier on Security

Shopper Surveillance Using Cell Phones

Electronic surveillance is becoming so easy that even marketers can do it: The cellphone tracking technology, called Footpath, is made by Path Intelligence Ltd...

Spider Webs Contain Ant Poison
From Schneier on Security

Spider Webs Contain Ant Poison

Shichang Zhang, Teck Hui Koh, Wee Khee Seah, Yee Hing Lai, Mark A. Elgar, and Daiqin Li (2011), "A Novel Property of Spider Silk: Chemical Defence Against Ants,"...

The DHS Partners with Major League Soccer to Promote Fear
From Schneier on Security

The DHS Partners with Major League Soccer to Promote Fear

It seems to be harder and harder to keep people scared: The Department

Friday Squid Blogging: Cephalopod Art Conference
From Schneier on Security

Friday Squid Blogging: Cephalopod Art Conference

There was an interdisciplinary cephalopod art conference earlier this year, in Minneapolis. Videos of the conference are available online. As usual, you can also...

Android Malware
From Schneier on Security

Android Malware

The Android platform is where the malware action is: What happens when anyone can develop and publish an application to the Android Market? A 472% increase ingain...

Free Cryptography Class
From Schneier on Security

Free Cryptography Class

Dan Boheh of Stanford University is teaching a free cryptography class starting in January.

Hack Against SCADA System
From Schneier on Security

Hack Against SCADA System

A hack against a SCADA system controlling a water pump in Illinois destroyed the pump. We know absolutely nothing here about the attack or the attacker's motivations...

Friday Squid Blogging: Squid Camouflage
From Schneier on Security

Friday Squid Blogging: Squid Camouflage

Some squid can switch their camouflage instantly. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered...

A Link between Altruism and Fairness
From Schneier on Security

A Link between Altruism and Fairness

I write a lot about altruism, fairness, and cooperation in my new book (out in February!), and this sort of thing interests me a lot: In a new study, researchers...

EU Bans X-Ray Body Scanners
From Schneier on Security

EU Bans X-Ray Body Scanners

The European Union has banned X-ray full body scanners at airports. Millimeter wave scanners are allowed as long as they conform to privacy guidelines. UnderArticle...

Detecting Psychopaths by their Speech Patterns
From Schneier on Security

Detecting Psychopaths by their Speech Patterns

Interesting: The researchers interviewed 52 convicted murderers, 14 of them ranked as psychopaths according to the Psychopathy Checklist-Revised, a 20-item assessment...

Paul Kocher
From Schneier on Security

Paul Kocher

Really nice article on crypotographer Paul Kocher and his company, Cryptography Research, Inc.

Sam Harris on Self-Defense
From Schneier on Security

Sam Harris on Self-Defense

I thought this was very interesting. His three principles are: Avoid dangerous people and dangerous places. Do not defend your property. Respond immediately and...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account