acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Did Reason Evolve as a Persuasion Tool?
From Schneier on Security

Did Reason Evolve as a Persuasion Tool?

Many of our informal security systems involve convincing others to do what we want them to. Here's a theory that says human reasoning evolved not as a tool tohere...

Firesheep in Use
From Schneier on Security

Firesheep in Use

Nice article on Firesheep in action.

My Next Book: Title and Cover
From Schneier on Security

My Next Book: Title and Cover

As my regular readers already know, I'm in the process of writing my next book. It's a book about why security exists: specifically, how a group of people protects...

The Problem with Cyber-crime Surveys
From Schneier on Security

The Problem with Cyber-crime Surveys

Good paper: "Sex, Lies and Cyber-crime Surveys," Dinei Florêncio and Cormac Herley, Microsoft Research. Abstract: Much of the information we have on cyber-crime...

The Life Cycle of Cryptographic Hash Functions
From Schneier on Security

The Life Cycle of Cryptographic Hash Functions

Nice chart.

RAND Corporation on Trusted Traveler
From Schneier on Security

RAND Corporation on Trusted Traveler

New paper: "Assessing the Security Benefits of a Trusted Traveler Program in the Presence of Attempted Attacker Exploitation and Compromise": Current aviation...

Fourth SHB Workshop
From Schneier on Security

Fourth SHB Workshop

I'm at SHB 2011, the fourth Interdisciplinary Workshop on Security and Human Behavior, at Carnegie Mellon University. This is a two-day invitational gathering of...

Friday Squid Blogging: Beautiful Deep-Sea Squid Picture
From Schneier on Security

Friday Squid Blogging: Beautiful Deep-Sea Squid Picture

From the Telegraph (also here).

Horse "No Ride" List
From Schneier on Security

Horse "No Ride" List

Excellent satire.

Court Ruling on "Reasonable" Electronic Banking Security
From Schneier on Security

Court Ruling on "Reasonable" Electronic Banking Security

One of the pleasant side effects of being too busy to write longer blog posts is that -- if I wait long enough -- someone else writes what I would have wanted to...

The Decline of al Qaeda
From Schneier on Security

The Decline of al Qaeda

Interesting essay.

Threat Models Colliding at Movie-Theater Projectors
From Schneier on Security

Threat Models Colliding at Movie-Theater Projectors

Interesting.

WEIS 2011
From Schneier on Security

WEIS 2011

I'm at the Tenth Workshop on Economics of Information Security (WEIS 2011) , at George Mason University. Most of the papers are online, and Ross Anderson is liveblogging...

Malware in Google's Android
From Schneier on Security

Malware in Google's Android

This is not a good development.

The Non-Anonymity of Bubble Forms
From Schneier on Security

The Non-Anonymity of Bubble Forms

It turns out that "fill-in-the-bubble" forms are not so anonymous.

Status Report on the War on Photography
From Schneier on Security

Status Report on the War on Photography

Worth reading: Morgan Leigh Manning, "Less than Picture Perfect: The Legal Relationship between Photographers' Rights and Law Enforcement," Tennessee Law Review...

Yet Another Way to Evade TSA's Full-Body Scanners
From Schneier on Security

Yet Another Way to Evade TSA's Full-Body Scanners

Last night, at the Third EPIC Champion of Freedom Awards Dinner, we gave an award to Susie Castillo, whose blog post and video of her treatment in the hands of...

Why it's So Difficult to Trace Cyber-Attacks
From Schneier on Security

Why it's So Difficult to Trace Cyber-Attacks

I've been asked this question by countless reporters in the past couple of weeks. Here's a good explanation. Shorter answer: it's easy to spoof source destination...

Friday Squid Blogging: Squid Cartoon
From Schneier on Security

Friday Squid Blogging: Squid Cartoon

Savage Chickens.

Two Good Rants
From Schneier on Security

Two Good Rants

Patrick Gray on why we secretly love LulzSec, and Robert Cringely on why we openly hate RSA.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account