acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Organized Crime in Ireland Evolves As Security Increases
From Schneier on Security

Organized Crime in Ireland Evolves As Security Increases

The whole article is interesting, but here's just one bit: The favoured quick-fix money-making exercise of the average Irish organised crime gang had, for decades...

Comparing al Qaeda and the IRA
From Schneier on Security

Comparing al Qaeda and the IRA

A really interesting article: Al Qaeda played all out, spent all its assets in a few years. In my dumb-ass 2005 article, I called the Al Qaeda method "real war"...

Man Flies with Someone Else's Ticket and No Legal ID
From Schneier on Security

Man Flies with Someone Else's Ticket and No Legal ID

Last week, I got a bunch of press calls about Olajide Oluwaseun Noibi, who flew from New York to Los Angeles using an expired ticket in someone else's name andmakes...

Research in Secure Chips
From Schneier on Security

Research in Secure Chips

Unsuprisingly, the U.S. military is funding reseach in this.

Friday Squid Blogging: Giant Squid as an Emblem for Ocean Conservation
From Schneier on Security

Friday Squid Blogging: Giant Squid as an Emblem for Ocean Conservation

It's a proposal.

TDSS Rootkit
From Schneier on Security

TDSS Rootkit

There's a new version: The latest TDL-4 version of the rootkit, which is used as a persistent backdoor to install other types of malware, infected 4.52 million...

Menwith Hill
From Schneier on Security

Menwith Hill

Article on the NSA's Menwith Hill listening station in the UK.

Chinese Army Developed Online Wargame
From Schneier on Security

Chinese Army Developed Online Wargame

This is a really weird story: After setting up its own cyber-warfare team, China's military has now developed its first online war game aimed at improving combat...

Yet Another "People Plug in Strange USB Sticks" Story
From Schneier on Security

Yet Another "People Plug in Strange USB Sticks" Story

I'm really getting tired of stories like this: Computer disks and USB sticks were dropped in parking lots of government buildings and private contractors, andcourse...

Common PINs
From Schneier on Security

Common PINs

There's some great data on common iPhone passwords. I'm sure the results also apply to banking PINs.

Friday Squid Blogging: Eating Humboldt Squid
From Schneier on Security

Friday Squid Blogging: Eating Humboldt Squid

Chris Cosentino, chef at Incanto in San Francisco, wants to serve you Humboldt squid.

Selling a Good Reputation on eBay
From Schneier on Security

Selling a Good Reputation on eBay

Here's someone who is selling positive feedback on eBay: Hello, for sale is a picture of a tree. This tree is an original and was taken by me. I have gotten...

Assisting a Hostage Taker via Facebook
From Schneier on Security

Assisting a Hostage Taker via Facebook

It's a new world: An armed Valdez, 36, held a woman hostage at a motel in a tense 16-hour, overnight standoff with SWAT teams, all while finding time to keep his...

Protecting Private Information on Smart Phones
From Schneier on Security

Protecting Private Information on Smart Phones

AppFence is a technology -- with a working prototype -- that protects personal information on smart phones. It does this by either substituting innocuous information...

NSA Style Manual
From Schneier on Security

NSA Style Manual

National Security Agency (NSA) SIGINT Reporter's Style and Usage Manual, 2010.

Insider Attack Against M&A Information in Document Titles
From Schneier on Security

Insider Attack Against M&A Information in Document Titles

Protecting against insiders is hard. Kluger and two accomplices -- a Wall Street trader and a mortgage broker -- allegedly stole and traded on material nonpublic...

Did Reason Evolve as a Persuasion Tool?
From Schneier on Security

Did Reason Evolve as a Persuasion Tool?

Many of our informal security systems involve convincing others to do what we want them to. Here's a theory that says human reasoning evolved not as a tool tohere...

Firesheep in Use
From Schneier on Security

Firesheep in Use

Nice article on Firesheep in action.

My Next Book: Title and Cover
From Schneier on Security

My Next Book: Title and Cover

As my regular readers already know, I'm in the process of writing my next book. It's a book about why security exists: specifically, how a group of people protects...

The Problem with Cyber-crime Surveys
From Schneier on Security

The Problem with Cyber-crime Surveys

Good paper: "Sex, Lies and Cyber-crime Surveys," Dinei Florêncio and Cormac Herley, Microsoft Research. Abstract: Much of the information we have on cyber-crime...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account