acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Friday Squid Blogging: Squid Forks
From Schneier on Security

Friday Squid Blogging: Squid Forks

Squid forks.

Looking Backward at Terrorism
From Schneier on Security

Looking Backward at Terrorism

Nice essay on the danger of too much security: The great lie of the war on terror is not that we can sacrifice a little liberty for greater security. It is that...

The Dilemma of Counterterrorism Policy
From Schneier on Security

The Dilemma of Counterterrorism Policy

Any institution delegated with the task of preventing terrorism has a dilemma: they can either do their best to prevent terrorism, or they can do their best toA...

Steven Pinker on Terrorism
From Schneier on Security

Steven Pinker on Terrorism

It's almost time for a deluge of "Ten Years After 9/11" essays. Here's Steven Pinker: The discrepancy between the panic generated by terrorism and the deaths...

New Attack on AES
From Schneier on Security

New Attack on AES

"Biclique Cryptanalysis of the Full AES," by Andrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger. Abstract. Since Rijndael was chosen as the Advanced...

Alarm Geese
From Schneier on Security

Alarm Geese

A prison in Brazil uses geese as part of its alarm system. There's a long tradition of this. Circa 400 BC, alarm geese alerted a Roman citadel to a Gaul attack...

Security by Default
From Schneier on Security

Security by Default

Nice essay by Christopher Soghoian on why cell phone and Internet providers need to enable security options by default.

Search Redirection and the Illicit Online Prescription Drug Trade
From Schneier on Security

Search Redirection and the Illicit Online Prescription Drug Trade

Really interesting research. Search-redirection attacks combine several well-worn tactics from black-hat SEO and web security. First, an attacker identifies high...

New, Undeletable, Web Cookie
From Schneier on Security

New, Undeletable, Web Cookie

A couple of weeks ago Wired reported the discovery of a new, undeletable, web cookie: Researchers at U.C. Berkeley have discovered that some of the net’s mostfinally...

Interview with Me
From Schneier on Security

Interview with Me

Here's an interview with me from the Homeland Security News Wire.

Friday Squid Blogging: Giant Squid Painted on Canal Narrowboat
From Schneier on Security

Friday Squid Blogging: Giant Squid Painted on Canal Narrowboat

Pretty. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

<i>Liars and Outliers</i> Cover
From Schneier on Security

Liars and Outliers Cover

My new book, Liars and Outliers, has a cover. Publication is still scheduled for the end of February -- in time for the RSA Conference -- assuming I finish the...

Rat that Applies Poison to its Fur
From Schneier on Security

Rat that Applies Poison to its Fur

The African crested rat applies tree poison to its fur to make itself more deadly. The researchers made their discovery after presenting a wild-caught crestedAcokanthera...

Counterfeit Pilot IDs and Uniforms Will Now Be Sufficient to Bypass Airport Security
From Schneier on Security

Counterfeit Pilot IDs and Uniforms Will Now Be Sufficient to Bypass Airport Security

This seems like a really bad idea: ...the Transportation Security Administration began a program Tuesday allowing pilots to skirt the security-screening process...

Security Flaws in Encrypted Police Radios
From Schneier on Security

Security Flaws in Encrypted Police Radios

"Why (Special Agent) Johnny (Still) Can

GPRS Hacked
From Schneier on Security

GPRS Hacked

Just announced: Nohl's group found a number of problems with GPRS. First, he says, lax authentication rules could allow an attacker to set up a fake cellular base...

"Taxonomy of Operational Cyber Security Risks"
From Schneier on Security

"Taxonomy of Operational Cyber Security Risks"

I'm a big fan of taxonomies, and this -- from Carnegie Mellon -- seems like a useful one: The taxonomy of operational cyber security risks, summarized in Table...

Free-Riding on Plant Security Countermeasures
From Schneier on Security

Free-Riding on Plant Security Countermeasures

There's a security story from biology I've used a few times: plants that use chemicals to call in airstrikes by wasps on the herbivores attacking them. This is...

MRI Lie Detectors
From Schneier on Security

MRI Lie Detectors

An article from Salon -- lots of interesting research. My previous blog post on the topic.

New Bank-Fraud Trojan
From Schneier on Security

New Bank-Fraud Trojan

Nasty: The German Federal Criminal Police (the
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account