acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

ShareMeNot
From Schneier on Security

ShareMeNot

ShareMeNot is a Firefox add-on for preventing tracking from third-party buttons (like the Facebook "Like" button or the Google "+1" button) until the user actually...

Data Privacy as a Prisoner's Dilemma
From Schneier on Security

Data Privacy as a Prisoner's Dilemma

Good analysis: Companies would be better off if they all provided meaningful privacy protections for consumers, but privacy is a collective action problem for...

Cryptography and Wiretapping
From Schneier on Security

Cryptography and Wiretapping

Matt Blaze analyzes the 2010 U.S. Wiretap Report. In 2000, government policy finally reversed course, acknowledging that encryption needed to become a critical...

Ars Technica on Liabilities and Computer Security
From Schneier on Security

Ars Technica on Liabilities and Computer Security

Good article: Halderman argued that secure software tends to come from companies that have a culture of taking security seriously. But it's hard to mandate, or...

Duplicating Physical Keys from Photographs (Sneakey)
From Schneier on Security

Duplicating Physical Keys from Photographs (Sneakey)

In this demonstration, researchers photographed keys from 200 feet away and then made working copies. From the paper: The access control provided by a physical...

iPhone Iris Scanning Technology
From Schneier on Security

iPhone Iris Scanning Technology

No indication about how well it works: The smartphone-based scanner, named Mobile Offender Recognition and Information System, or MORIS, is made by BI2 Technologies...

Revenge Effects of Too-Safe Playground Equipment
From Schneier on Security

Revenge Effects of Too-Safe Playground Equipment

Sometimes too much security isn't good. After observing children on playgrounds in Norway, England and Australia, Dr. Sandseter identified six categories of risky...

Smuggling Drugs in Unwitting People's Car Trunks
From Schneier on Security

Smuggling Drugs in Unwitting People's Car Trunks

This is clever: A few miles away across the Rio Grande, the FBI determined that Chavez and Gomez were using lookouts to monitor the SENTRI Express Lane at the...

Friday Squid Blogging: Glass Squid
From Schneier on Security

Friday Squid Blogging: Glass Squid

Pretty.

Is There a Hacking Epidemic?
From Schneier on Security

Is There a Hacking Epidemic?

Freakonomics asks: "Why has there been such a spike in hacking recently? Or is it merely a function of us paying closer attention and of institutions being more...

Google Detects Malware in its Search Data
From Schneier on Security

Google Detects Malware in its Search Data

This is interesting: As we work to protect our users and their information, we sometimes discover unusual patterns of activity. Recently, we found some unusual...

Members of "Anonymous" Hacker Group Arrested
From Schneier on Security

Members of "Anonymous" Hacker Group Arrested

The police arrested sixteen suspected members of the Anonymous hacker group. Whatever you may think of their politics, the group committed crimes and their members...

Telex Anti-Censorship System
From Schneier on Security

Telex Anti-Censorship System

This is really clever: Many anticensorship systems work by making an encrypted connection (called a “tunnel”) from the user's computer to a trusted proxy server...

<i>Liars and Outliers</i> Cover
From Schneier on Security

Liars and Outliers Cover

My new book, Liars and Outliers, has a cover. Publication is still scheduled for the end of February -- in time for the RSA Conference -- assuming I finish the...

British Phone Hacking Scandal
From Schneier on Security

British Phone Hacking Scandal

Ross Anderson discusses the technical and policy details.

Friday Squid Blogging: Giant School of Squid
From Schneier on Security

Friday Squid Blogging: Giant School of Squid

Neat pictures.

Interview in Infosecurity Magazine
From Schneier on Security

Interview in Infosecurity Magazine

I think I gave this interview at the RSA Conference in February.

Degree Plans of the Future
From Schneier on Security

Degree Plans of the Future

You can now get a Master of Science in Strategic Studies in Weapons of Mass Destruction. Well, maybe you can't: "It's not going to be open enrollment (or) traditional...

My Next Book Title: Liars and Outliers
From Schneier on Security

My Next Book Title: Liars and Outliers

Thank you for all your comments and suggestions regarding my next book title. It will be:      Liars and Outliers:      How Security Holds Society Together We're...

Physical Key Escrow
From Schneier on Security

Physical Key Escrow

This creates far more security risks than it solves: The city council in Cedar Falls, Iowa has absolutely crossed the line. They voted 6-1 in favor of expanding...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account