acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Advanced Persistent Threat (APT)
From Schneier on Security

Advanced Persistent Threat (APT)

It's taken me a few years, but I've come around to this buzzword. It highlights an important characteristic of a particular sort of Internet attacker. A conventional...

Unlocking any iPad2 using a Smart Cover
From Schneier on Security

Unlocking any iPad2 using a Smart Cover

This security bug is just plain weird.

Cutting Wallets Out of Drunks' Pockets on New York City Subways
From Schneier on Security

Cutting Wallets Out of Drunks' Pockets on New York City Subways

It's a crime with finesse: But he is actually a middle-aged or older man who has been doing this for a very long time. And he is a fading breed. "It's like a...

Fake Documents that Alarm if Opened
From Schneier on Security

Fake Documents that Alarm if Opened

This sort of thing seems like a decent approach, but it has a lot of practical problems: In the wake of Wikileaks, the Department of Defense has stepped up its...

Friday Squid Blogging: <i>Star Trek IV</i>, now with Squid
From Schneier on Security

Friday Squid Blogging: Star Trek IV, now with Squid

Someone edited Star Trek IV, removing the whales and replacing them with giant squid. As usual, you can also use this squid post to talk about the security stories...

Weaponized UAV Drones in the Hands of Local Police
From Schneier on Security

Weaponized UAV Drones in the Hands of Local Police

Why does anyone think this is a good idea? The police in Montgomery County

Journal Article on Cyberwar
From Schneier on Security

Journal Article on Cyberwar

From the Journal of Strategic Studies: "Cyber War Will Not Take Place" (full article is behind a paywall): Abstract: For almost two decades, experts and defense...

Underage Children on Facebook
From Schneier on Security

Underage Children on Facebook

Interesting research on how parents help their children lie about their age to get onto Facebook. One reaction to our data might be that companies should not be...

DARPA Cyber Colloquium
From Schneier on Security

DARPA Cyber Colloquium

I note that the three "industry leaders" speaking at the DARPA Cyber Colloquium next week have about 75 years of government experience between them.

<i>The Economist</i> on Lying
From Schneier on Security

The Economist on Lying

Two articles. And this is the cited work.

Cell Phone Surveillance System
From Schneier on Security

Cell Phone Surveillance System

I was not surprised that police forces are buying this system, but at its capabilities. Britain's largest police force is operating covert surveillance technology...

Another ATM Theft Tactic
From Schneier on Security

Another ATM Theft Tactic

This brazen tactic is from Malaysia. Robbers sabotage the machines, and then report the damage to the bank. When the banks send repair technicians to open and...

Friday Squid Blogging: Video of Kid Eating Squid
From Schneier on Security

Friday Squid Blogging: Video of Kid Eating Squid

It's hard to tell if he likes it. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

Full Extent of the Attack that Compromised RSA in March
From Schneier on Security

Full Extent of the Attack that Compromised RSA in March

Brian Kerbs has done the analysis; it's something like 760 companies that were compromised. Among the more interesting names on the list are Abbott Labs, the Alabama...

XKCD Today
From Schneier on Security

XKCD Today

It's a good one. Be sure to read the hover-over text.

Secret Codes in Bacteria
From Schneier on Security

Secret Codes in Bacteria

Neat: Researchers have invented a new form of secret messaging using bacteria that make glowing proteins only under certain conditions. In addition to being useful...

The Security of SSL
From Schneier on Security

The Security of SSL

EFF reports on the security of SSL: The most interesting entry in that table is the "CA compromise" one, because those are incidents that could affect any or every...

Cracking the Copiale Cipher
From Schneier on Security

Cracking the Copiale Cipher

I don't follow historical cryptography, so all of this comes as a surprise to me. But something called the Copiale Cipher from the 18th Century has been cracked...

Demands from Law Enforcement for Google Data
From Schneier on Security

Demands from Law Enforcement for Google Data

Google releases statistics: Google received more than 15,600 requests in the January-June period, 10 percent more than the final six months of last year. The requests...

Twofish Mentioned in Thriller Novel
From Schneier on Security

Twofish Mentioned in Thriller Novel

I've been told that the Twofish encryption algorithm is mentioned in the book Abuse of Power, in the first paragraph of Chapter 3. Did rhe terrorists use it?...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account