acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Friday Squid Blogging: SQUIDS Game
From Schneier on Security

Friday Squid Blogging: SQUIDS Game

It's coming to the iPhone and iPad, then to other platforms: In SQUIDS, players will command a small army of stretchy, springy sea creatures to protect an idyllic...

The Efficacy of Post-9/11 Counterterrorism
From Schneier on Security

The Efficacy of Post-9/11 Counterterrorism

This is an interesting article. The authors argue that the whole war-on-terror nonsense is useless -- that's not new -- but that the security establishment knows...

A Professional ATM Theft
From Schneier on Security

A Professional ATM Theft

Fidelity National Information Services Inc. (FIS) lost $13M to an ATM theft earlier this year: KrebsOnSecurity recently discovered previously undisclosed details...

Unredacted U.S. Diplomatic WikiLeaks Cables Published
From Schneier on Security

Unredacted U.S. Diplomatic WikiLeaks Cables Published

It looks as if the entire mass of U.S. diplomatic cables that WikiLeaks had is available online somewhere. How this came about is a good illustration of how security...

Forged Google Certificate
From Schneier on Security

Forged Google Certificate

There's been a forged Google certificate out in the wild for the past month and a half. Whoever has it -- evidence points to the Iranian government -- can, if...

Job Opening: TSA Public Affairs Specialist
From Schneier on Security

Job Opening: TSA Public Affairs Specialist

This job can't be fun: This Public Affairs Specialist position is located in the Office of Strategic Communications and Public Affairs (SCPA), Transportation Security...

The Effects of Social Media on Undercover Policing
From Schneier on Security

The Effects of Social Media on Undercover Policing

Social networking sites make it very difficult, if not impossible, to have undercover police officers: "The results found that 90 per cent of female officers were...

Facebook Privacy Guide
From Schneier on Security

Facebook Privacy Guide

It's actually pretty good. Also note that the site is redesigning its privacy. As we learned from Microsoft, nothing motivates a company to improve its security...

Details of the RSA Hack
From Schneier on Security

Details of the RSA Hack

We finally have some, even though the company isn't talking: So just how well crafted was the e-mail that got RSA hacked? Not very, judging by what F-Secure found...

Screenshots of Chinese Hacking Tool
From Schneier on Security

Screenshots of Chinese Hacking Tool

It's hard to know how serious this really is: The screenshots appear as B-roll footage in the documentary for six seconds

Friday Squid Blogging: Squid Fishing in Ulleungdo, Korea
From Schneier on Security

Friday Squid Blogging: Squid Fishing in Ulleungdo, Korea

The industry is in decline: A generation ago, most of the island's 10,000 residents worked in the squid industry, either as sellers like Kim or as farmer-fishermen...

Preventing the Theft of Wire Cutters
From Schneier on Security

Preventing the Theft of Wire Cutters

This is a picture of a pair of wire cutters secured to a table with a wire. Someone isn't thinking this through....

The Problem with Using the Cold War Metaphor to Describe Cyberspace Risks
From Schneier on Security

The Problem with Using the Cold War Metaphor to Describe Cyberspace Risks

Nice essay on the problems with talking about cyberspace risks using "Cold War" metaphors: The problem with threat inflation and misapplied history is that there...

Terrorism in the U.S. Since 9/11
From Schneier on Security

Terrorism in the U.S. Since 9/11

John Mueller and his students analyze the 33 cases of attempted terrorism in the U.S. since 9/11. So few of them are actually real, and so many of them were created...

Funniest Joke at the Edinburgh Fringe Festival
From Schneier on Security

Funniest Joke at the Edinburgh Fringe Festival

Nick Helm won an award for the funniest joke at the Edinburgh Fringe Festival: Nick Helm: "I needed a password with eight characters so I picked Snow White and...

Moving 211 Tons of Gold
From Schneier on Security

Moving 211 Tons of Gold

The security problems associated with moving $12B in gold from London to Venezuela. It seems to me that Ch

The Security Risks of Not Teaching Malware
From Schneier on Security

The Security Risks of Not Teaching Malware

Essay by George Ledin on the security risks of not teaching students malware.

Stealing ATM PINs with a Thermal Camera
From Schneier on Security

Stealing ATM PINs with a Thermal Camera

It's easy: Researchers from UCSD pointed thermal cameras towards plastic ATM PIN pads and metal ATM PIN pads to test how effective they were at stealing PIN numbers...

Smartphone Keystroke Logging Using the Motion Sensor
From Schneier on Security

Smartphone Keystroke Logging Using the Motion Sensor

Clever: "When the user types on the soft keyboard on her smartphone (especially when she holds her phone by hand rather than placing it on a fixed surface), the...

Security for Implanted Medical Devices
From Schneier on Security

Security for Implanted Medical Devices

Worried about someone hacking your implanted medical devices? Here's a signal-jamming device you can wear.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account