acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Duplicating Physical Keys from Photographs (Sneakey)
From Schneier on Security

Duplicating Physical Keys from Photographs (Sneakey)

In this demonstration, researchers photographed keys from 200 feet away and then made working copies. From the paper: The access control provided by a physical...

iPhone Iris Scanning Technology
From Schneier on Security

iPhone Iris Scanning Technology

No indication about how well it works: The smartphone-based scanner, named Mobile Offender Recognition and Information System, or MORIS, is made by BI2 Technologies...

Revenge Effects of Too-Safe Playground Equipment
From Schneier on Security

Revenge Effects of Too-Safe Playground Equipment

Sometimes too much security isn't good. After observing children on playgrounds in Norway, England and Australia, Dr. Sandseter identified six categories of risky...

Smuggling Drugs in Unwitting People's Car Trunks
From Schneier on Security

Smuggling Drugs in Unwitting People's Car Trunks

This is clever: A few miles away across the Rio Grande, the FBI determined that Chavez and Gomez were using lookouts to monitor the SENTRI Express Lane at the...

Friday Squid Blogging: Glass Squid
From Schneier on Security

Friday Squid Blogging: Glass Squid

Pretty.

Is There a Hacking Epidemic?
From Schneier on Security

Is There a Hacking Epidemic?

Freakonomics asks: "Why has there been such a spike in hacking recently? Or is it merely a function of us paying closer attention and of institutions being more...

Google Detects Malware in its Search Data
From Schneier on Security

Google Detects Malware in its Search Data

This is interesting: As we work to protect our users and their information, we sometimes discover unusual patterns of activity. Recently, we found some unusual...

Members of "Anonymous" Hacker Group Arrested
From Schneier on Security

Members of "Anonymous" Hacker Group Arrested

The police arrested sixteen suspected members of the Anonymous hacker group. Whatever you may think of their politics, the group committed crimes and their members...

Telex Anti-Censorship System
From Schneier on Security

Telex Anti-Censorship System

This is really clever: Many anticensorship systems work by making an encrypted connection (called a “tunnel”) from the user's computer to a trusted proxy server...

<i>Liars and Outliers</i> Cover
From Schneier on Security

Liars and Outliers Cover

My new book, Liars and Outliers, has a cover. Publication is still scheduled for the end of February -- in time for the RSA Conference -- assuming I finish the...

British Phone Hacking Scandal
From Schneier on Security

British Phone Hacking Scandal

Ross Anderson discusses the technical and policy details.

Friday Squid Blogging: Giant School of Squid
From Schneier on Security

Friday Squid Blogging: Giant School of Squid

Neat pictures.

Interview in Infosecurity Magazine
From Schneier on Security

Interview in Infosecurity Magazine

I think I gave this interview at the RSA Conference in February.

Degree Plans of the Future
From Schneier on Security

Degree Plans of the Future

You can now get a Master of Science in Strategic Studies in Weapons of Mass Destruction. Well, maybe you can't: "It's not going to be open enrollment (or) traditional...

My Next Book Title: Liars and Outliers
From Schneier on Security

My Next Book Title: Liars and Outliers

Thank you for all your comments and suggestions regarding my next book title. It will be:      Liars and Outliers:      How Security Holds Society Together We're...

Physical Key Escrow
From Schneier on Security

Physical Key Escrow

This creates far more security risks than it solves: The city council in Cedar Falls, Iowa has absolutely crossed the line. They voted 6-1 in favor of expanding...

Interview with Evgeny Kaspersky
From Schneier on Security

Interview with Evgeny Kaspersky

Interesting.

Insurgent Groups Exhibit Learning Curve
From Schneier on Security

Insurgent Groups Exhibit Learning Curve

Interesting research: After analyzing reams of publicly available data on casualties from Iraq, Afghanistan, Pakistan and decades of terrorist attacks, the scientists...

History of Stuxnet
From Schneier on Security

History of Stuxnet

Nice article.

Friday Squid Blogging: Giant Squid Egg
From Schneier on Security

Friday Squid Blogging: Giant Squid Egg

Interesting pictures. Article is in Italian, though. Google Translate translation.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account