acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Hacking Marconi's Wireless in 1903
From Schneier on Security

Hacking Marconi's Wireless in 1903

A great story: Yet before the demonstration could begin, the apparatus in the lecture theatre began to tap out a message. At first, it spelled out just one word...

Butt Identification
From Schneier on Security

Butt Identification

Here's a new biometric: how you sit: ...researchers there developed a system that can recognize a person by the backside when the person takes a seat. The system...

The Collar Bomb Robbery
From Schneier on Security

The Collar Bomb Robbery

Really interesting story of the collar-bomb robbery -- and subsequent investigation -- from 2003.

Hacking Subway's POS System
From Schneier on Security

Hacking Subway's POS System

The story of how Subway's point-of-sale system was hacked for $3 million.

Merry Christmas from the TSA
From Schneier on Security

Merry Christmas from the TSA

Cupcakes deemed security threat: Rebecca Hains says she was going through security at the airport in Las Vegas when a TSA agent pulled her aside and said the cupcake...

Friday Squid Blogging: Goldman Sachs and the Vampire Squid Metaphor
From Schneier on Security

Friday Squid Blogging: Goldman Sachs and the Vampire Squid Metaphor

It's a metaphor that will not die. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

Santa Hacked
From Schneier on Security

Santa Hacked

Mildly amusing video.

Multiple Protocol Attacks
From Schneier on Security

Multiple Protocol Attacks

In 1997, I wrote about something called a chosen-protocol attack, where an attacker can use one protocol to break another. Here's an example of the same thing...

How to Open a Padlock with a  Coke Can
From Schneier on Security

How to Open a Padlock with a Coke Can

A nice tutorial on making and using shims to open padlocks.

Plasmonics Anti-Counterfeiting Technology
From Schneier on Security

Plasmonics Anti-Counterfeiting Technology

This could be interesting: NOtES exploits an obscure area of physics to accomplish its bright and sharp display, known as plasmonics. Light waves interact with...

Friday Squid Blogging: Squid Season
From Schneier on Security

Friday Squid Blogging: Squid Season

It's squid season off the coast of Southern California. As usual, you can also use this squid post to talk about the security stories in the news that I haven't...

Me Speaking on Cryptography in 1997
From Schneier on Security

Me Speaking on Cryptography in 1997

In 1997, I spoke at the Beyond HOPE Conference in New York. (HOPE stood for "Hackers Over Planet Earth.) A video of that talk is available online.

Cameo in a Rock Video
From Schneier on Security

Cameo in a Rock Video

At the 1:46 mark, you'll see my first cameo appearance in a transvestite-themed rock video.

More on the Captured U.S. Drone
From Schneier on Security

More on the Captured U.S. Drone

There's a report that Iran hacked the drones' GPS systems: "The GPS navigation is the weakest point," the Iranian engineer told the Monitor, giving the most detailed...

Snow Cone Machines for Homeland Security
From Schneier on Security

Snow Cone Machines for Homeland Security

When you give out money based on politics, without any accounting, this is what you get: The West Michigan Shoreline Regional Development Commission (WMSRDC) is...

The EFF's Sovereign Key Proposal
From Schneier on Security

The EFF's Sovereign Key Proposal

Proposal here.

Investigative Report on "Buckshot Yankee"
From Schneier on Security

Investigative Report on "Buckshot Yankee"

This is a really good analysis about the Buckshot Yankee attack against the classified military computer network in 2008. It contains a bunch of details I had...

<i>Liars and Outliers</i> Galleys
From Schneier on Security

Liars and Outliers Galleys

My publisher is printing galley copies of Liars and Outliers. If anyone out there has a legitimate reason to get one, like writing book reviews for a newspaper...

Feeling vs. Reality of Security in Sparrows
From Schneier on Security

Feeling vs. Reality of Security in Sparrows

Sparrows have fewer surviving offspring if they feel insecure, regardless of whether they actually are insecure. Liana Y. Zanette, Aija F. White, Marek C. Allen...

Yet More Fear-Mongering from the DHS
From Schneier on Security

Yet More Fear-Mongering from the DHS

Al Qaeda is sewing bombs into people. Actually, not really. This is an "aspirational" terrorist threat, which basically means that someone mentioned it whilelot...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account