acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

"Taxonomy of Operational Cyber Security Risks"
From Schneier on Security

"Taxonomy of Operational Cyber Security Risks"

I'm a big fan of taxonomies, and this -- from Carnegie Mellon -- seems like a useful one: The taxonomy of operational cyber security risks, summarized in Table...

Free-Riding on Plant Security Countermeasures
From Schneier on Security

Free-Riding on Plant Security Countermeasures

There's a security story from biology I've used a few times: plants that use chemicals to call in airstrikes by wasps on the herbivores attacking them. This is...

MRI Lie Detectors
From Schneier on Security

MRI Lie Detectors

An article from Salon -- lots of interesting research. My previous blog post on the topic.

New Bank-Fraud Trojan
From Schneier on Security

New Bank-Fraud Trojan

Nasty: The German Federal Criminal Police (the

<i>Business Week</i> on The Cyberwar Arms Race
From Schneier on Security

Business Week on The Cyberwar Arms Race

I've been using the phrase "arms race" to describe the world's militaries' rush into cyberspace for a couple of years now. Here's a good article on the topic that...

Friday Squid Blogging: Severed Hand is Actually A Dried Squid
From Schneier on Security

Friday Squid Blogging: Severed Hand is Actually A Dried Squid

I just can't make this stuff up: A report of a severed hand found at an Oahu seabird sanctuary has turned out to be dried squid. Remember: if you see something...

XKCD on the CIA Hack
From Schneier on Security

XKCD on the CIA Hack

So true.

Zodiac Cipher Cracked
From Schneier on Security

Zodiac Cipher Cracked

I admit I don't pay much attention to pencil-and-paper ciphers, so I knew nothing about the Zodiac cipher. Seems it has finally been broken: The Zodiac Killer...

German Police Call Airport Full-Body Scanners Useless
From Schneier on Security

German Police Call Airport Full-Body Scanners Useless

I'm not surprised: The weekly Welt am Sonntag, quoting a police report, said 35 percent of the 730,000 passengers checked by the scanners set off the alarm more...

Home-Made Wi-Fi Hacking, Phone Snooping, UAV
From Schneier on Security

Home-Made Wi-Fi Hacking, Phone Snooping, UAV

Impressive.

Hacking Lotteries
From Schneier on Security

Hacking Lotteries

Two items on hacking lotteries. The first is about someone who figured out how to spot winner in a scratch-of tic-tac-toe style game, and a daily draw style game...

New Information on the Inventor of the One-Time Pad
From Schneier on Security

New Information on the Inventor of the One-Time Pad

Seems that the one-time pad was not first invented by Vernam: He could plainly see that the document described a technique called the one-time pad fully 35 years...

Identifying People by their Writing Style
From Schneier on Security

Identifying People by their Writing Style

The article is in the context of the big Facebook lawsuit, but the part about identifying people by their writing style is interesting: Recently, a team of computer...

Developments in Facial Recognition
From Schneier on Security

Developments in Facial Recognition

Eventually, it will work. You'll be able to wear a camera that will automatically recognize someone walking towards you, and a microphone that will automatically...

Attacking PLCs Controlling Prison Doors
From Schneier on Security

Attacking PLCs Controlling Prison Doors

Embedded system vulnerabilities in prisons: Some of the same vulnerabilities that the Stuxnet superworm used to sabotage centrifuges at a nuclear plant in Iran...

Breaking the Xilinx Virtex-II FPGA Bitstream Encryption
From Schneier on Security

Breaking the Xilinx Virtex-II FPGA Bitstream Encryption

It's a power-analysis attack, which makes it much harder to defend against. And since the attack model is an engineer trying to reverse-engineer the chip, it's...

Using Science Fiction to Teach Computer Security
From Schneier on Security

Using Science Fiction to Teach Computer Security

Interesting paper: "Science Fiction Prototyping and Security Education: Cultivating Contextual and Societal Thinking in Computer Security Education and Beyond,"...

Friday Squid Blogging: 25-foot Giant Squid Caught in Fishing Net
From Schneier on Security

Friday Squid Blogging: 25-foot Giant Squid Caught in Fishing Net

A 25-foot (or maybe 23-foot) giant squid was caught off the coast of Florida. Also, I'm going to try something new. Let's use this weekly squid post to talk...

Luggage Hack
From Schneier on Security

Luggage Hack

Bypassing the lock on luggage.

Hacking Apple Laptop Batteries
From Schneier on Security

Hacking Apple Laptop Batteries

Interesting: Security researcher Charlie Miller, widely known for his work on Mac OS X and Apple's iOS, has discovered an interesting method that enables him to...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account