acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

The Life Cycle of Cryptographic Hash Functions
From Schneier on Security

The Life Cycle of Cryptographic Hash Functions

Nice chart.

RAND Corporation on Trusted Traveler
From Schneier on Security

RAND Corporation on Trusted Traveler

New paper: "Assessing the Security Benefits of a Trusted Traveler Program in the Presence of Attempted Attacker Exploitation and Compromise": Current aviation...

Fourth SHB Workshop
From Schneier on Security

Fourth SHB Workshop

I'm at SHB 2011, the fourth Interdisciplinary Workshop on Security and Human Behavior, at Carnegie Mellon University. This is a two-day invitational gathering of...

Friday Squid Blogging: Beautiful Deep-Sea Squid Picture
From Schneier on Security

Friday Squid Blogging: Beautiful Deep-Sea Squid Picture

From the Telegraph (also here).

Horse "No Ride" List
From Schneier on Security

Horse "No Ride" List

Excellent satire.

Court Ruling on "Reasonable" Electronic Banking Security
From Schneier on Security

Court Ruling on "Reasonable" Electronic Banking Security

One of the pleasant side effects of being too busy to write longer blog posts is that -- if I wait long enough -- someone else writes what I would have wanted to...

The Decline of al Qaeda
From Schneier on Security

The Decline of al Qaeda

Interesting essay.

Threat Models Colliding at Movie-Theater Projectors
From Schneier on Security

Threat Models Colliding at Movie-Theater Projectors

Interesting.

WEIS 2011
From Schneier on Security

WEIS 2011

I'm at the Tenth Workshop on Economics of Information Security (WEIS 2011) , at George Mason University. Most of the papers are online, and Ross Anderson is liveblogging...

Malware in Google's Android
From Schneier on Security

Malware in Google's Android

This is not a good development.

The Non-Anonymity of Bubble Forms
From Schneier on Security

The Non-Anonymity of Bubble Forms

It turns out that "fill-in-the-bubble" forms are not so anonymous.

Status Report on the War on Photography
From Schneier on Security

Status Report on the War on Photography

Worth reading: Morgan Leigh Manning, "Less than Picture Perfect: The Legal Relationship between Photographers' Rights and Law Enforcement," Tennessee Law Review...

Yet Another Way to Evade TSA's Full-Body Scanners
From Schneier on Security

Yet Another Way to Evade TSA's Full-Body Scanners

Last night, at the Third EPIC Champion of Freedom Awards Dinner, we gave an award to Susie Castillo, whose blog post and video of her treatment in the hands of...

Why it's So Difficult to Trace Cyber-Attacks
From Schneier on Security

Why it's So Difficult to Trace Cyber-Attacks

I've been asked this question by countless reporters in the past couple of weeks. Here's a good explanation. Shorter answer: it's easy to spoof source destination...

Friday Squid Blogging: Squid Cartoon
From Schneier on Security

Friday Squid Blogging: Squid Cartoon

Savage Chickens.

Two Good Rants
From Schneier on Security

Two Good Rants

Patrick Gray on why we secretly love LulzSec, and Robert Cringely on why we openly hate RSA.

New Airport Scanning Technology
From Schneier on Security

New Airport Scanning Technology

Interesting: Iscon's patented, thermo-conductive technology combines infrared (IR) and heat transfer, for high-resolution imaging without using any radiation....

Spam as a Business
From Schneier on Security

Spam as a Business

Interesting research: Kirill Levchenko, et al. (2010), "Click Trajectories -- End-to-End Analysis of the Spam Value Chain," IEEE Symposium on Security and Privacy...

25% of U.S. Criminal Hackers are Police Informants
From Schneier on Security

25% of U.S. Criminal Hackers are Police Informants

I have no idea if this is true: In some cases, popular illegal forums used by cyber criminals as marketplaces for stolen identities and credit card numbers have...

Tennessee Makes Password Sharing Illegal
From Schneier on Security

Tennessee Makes Password Sharing Illegal

Here's a new law that won't work: State lawmakers in country music's capital have passed a groundbreaking measure that would make it a crime to use a friend's...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account