acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Assessing Terrorist Threats to Commercial Aviation
From Schneier on Security

Assessing Terrorist Threats to Commercial Aviation

This article on airplane security says many of the same things I've been saying for years: Given the breadth and complexity of threats to commercial aviation,Wired...

Iranians Capture U.S. Drone
From Schneier on Security

Iranians Capture U.S. Drone

Iran has captured a U.S. surveillance drone. No one is sure how it happened. Looking at the pictures of the drone, it wasn't shot down and it didn't crash. The...

Dumbest Camera Ban Ever
From Schneier on Security

Dumbest Camera Ban Ever

In London: While photography bans are pretty common, the station has decided to only ban DSLRs due to "their combination of high quality sensor and high resolution"...

First-Person Account of a TSA Airport Screener
From Schneier on Security

First-Person Account of a TSA Airport Screener

This is a few years old, but I seem not to have blogged it before.

Friday Squid Blogging: Humbolt Squid Mystery Solved
From Schneier on Security

Friday Squid Blogging: Humbolt Squid Mystery Solved

Humbolt Squid off the coast of Mexico are spawning younger and smaller than usual. El Nino is to blame. The mystery was solved by a class of biology students....

Robbing a Bank as Part of a Penetration Test
From Schneier on Security

Robbing a Bank as Part of a Penetration Test

A funny story.

Lockable USB Hard Drive
From Schneier on Security

Lockable USB Hard Drive

Just in time for Christmas, a USB drive housed in a physical combination lock.

DARPA Unshredding Contest
From Schneier on Security

DARPA Unshredding Contest

DARPA held an unshredding contest, and there's a winner: "Lots of experts were skeptical that a solution could be produced at all let alone within the short time...

Skype Security Flaw
From Schneier on Security

Skype Security Flaw

Just announced: The researchers found several properties of Skype that can track not only users' locations over time, but also their peer-to-peer (P2P) file-sharing...

Tagging People with Invisible Ink
From Schneier on Security

Tagging People with Invisible Ink

In Montreal, police marked protesters with invisible ink to be able to identify them later. The next step is going to be a spray that marks people surreptitiously...

Security Problems with U.S. Cloud Providers
From Schneier on Security

Security Problems with U.S. Cloud Providers

Invasive U.S. surveillance programs, either illegal like the NSA's wiretapping of AT&T phone lines or legal as authorized by the PATRIOT Act, are causing foreign...

Recent Developments in Full Disclosure
From Schneier on Security

Recent Developments in Full Disclosure

Last week, I had a long conversation with Robert Lemos over an article he was writing about full disclosure. He had noticed that companies have recently been reacting...

GCHQ Hacking Contest
From Schneier on Security

GCHQ Hacking Contest

GCHQ is holding a hacking contest to drum up new recruits.

Carrier IQ Spyware
From Schneier on Security

Carrier IQ Spyware

Spyware on many smart phones monitors your every action, including collecting individual keystrokes. The company that makes and runs this software on behalf of...

Friday Squid Blogging: Squid-Inspired Robot
From Schneier on Security

Friday Squid Blogging: Squid-Inspired Robot

It crawls on land.

I Received an Honorary Doctorate
From Schneier on Security

I Received an Honorary Doctorate

Last weekend, I received an honorary PhD from the University of Westminster, in London. I have had mixed feelings about this since I was asked early this year....

Hacking Printers and Setting Them on Fire
From Schneier on Security

Hacking Printers and Setting Them on Fire

It's the kind of research result that screams hype, but online attacks that have physical-world consequences are fundamentally a different sort of threat. I suspect...

Walls as Security Theater
From Schneier on Security

Walls as Security Theater

Interesting essay on walls and their effects: Walls, then, are built not for security, but for a sense of security. The distinction is important, as those whoas...

Full-Disk Encryption Works
From Schneier on Security

Full-Disk Encryption Works

According to researchers, full-disk encryption is hampering police forensics. The authors of the report suggest there are some things law enforcement can do, but...

Status Report: <i>Liars and Outliers</i>
From Schneier on Security

Status Report: Liars and Outliers

After a long and hard year, Liars and Outliers is done. I submitted the manuscript to the publisher on Oct 1, got edits back from both an outside editor and a...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account