acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Spam as a Business
From Schneier on Security

Spam as a Business

Interesting research: Kirill Levchenko, et al. (2010), "Click Trajectories -- End-to-End Analysis of the Spam Value Chain," IEEE Symposium on Security and Privacy...

25% of U.S. Criminal Hackers are Police Informants
From Schneier on Security

25% of U.S. Criminal Hackers are Police Informants

I have no idea if this is true: In some cases, popular illegal forums used by cyber criminals as marketplaces for stolen identities and credit card numbers have...

Tennessee Makes Password Sharing Illegal
From Schneier on Security

Tennessee Makes Password Sharing Illegal

Here's a new law that won't work: State lawmakers in country music's capital have passed a groundbreaking measure that would make it a crime to use a friend's...

Fighting Terrorism with Cupcakes
From Schneier on Security

Fighting Terrorism with Cupcakes

MI6 hacked into an online al-Qaeda magazine and replaced bomb-making instructions with a cupcake recipe. It's a more polite hack than subtly altering the recipe...

Analysis of Redaction Failures
From Schneier on Security

Analysis of Redaction Failures

Redaction failures are so common that I stopped blogging about them years ago. This is the first analysis I have seen of technical redaction failures. And here's...

Friday Squid Blogging: LOLCat and Squid Toy
From Schneier on Security

Friday Squid Blogging: LOLCat and Squid Toy

Cute.

World War II Tunny Cryptanalysis Machine Rebuilt at Bletchley Park
From Schneier on Security

World War II Tunny Cryptanalysis Machine Rebuilt at Bletchley Park

Neat: The rebuild team had only a few photographs, partial circuit diagrams and the fading memories of a few original Tunny operators to go on. Nonetheless a team...

Security vs. Privacy
From Schneier on Security

Security vs. Privacy

Daniel Solove on the security vs. privacy debate.  

Open-Source Software Feels Insecure
From Schneier on Security

Open-Source Software Feels Insecure

At first glance, this seems like a particularly dumb opening line of an article: Open-source software may not sound compatible with the idea of strong cybersecurity...

Spear Phishing Attacks from China Against Gmail Accounts
From Schneier on Security

Spear Phishing Attacks from China Against Gmail Accounts

Reporters have been calling me pretty much constantly about this story, but I can't figure out why in the world this is news. Attacks from China -- old news; attacks...

Man-in-the-Middle Attack Against the MCAT Exam
From Schneier on Security

Man-in-the-Middle Attack Against the MCAT Exam

In Applied Cryptography, I wrote about the "Chess Grandmaster Problem," a man-in-the-middle attack. Basically, Alice plays chess remotely with two grandmasters...

Three-Volume History of Counterintelligence
From Schneier on Security

Three-Volume History of Counterintelligence

CI Reader: An American Revolution Into the New Millennium, Volumes I, II, and III is published by the U.S. Office of the National Counterintelligence Executive....

The U.S. Seems to Have a Secret Stealth Helicopter
From Schneier on Security

The U.S. Seems to Have a Secret Stealth Helicopter

That's what the U.S. destroyed after a malfunction in Pakistan during the Bin Laden assassination. (For helicopters, "stealth" is less concerned with radar signatures...

Keeping Sensitive Information Out of the Hands of Terrorists Through Self-Restraint
From Schneier on Security

Keeping Sensitive Information Out of the Hands of Terrorists Through Self-Restraint

In my latest book (available February), I talk about various mechanisms for societal security: how we as a group protect ourselves from the "dishonest minority"...

Lockheed Martin Hack Linked to RSA's SecurID Breach
From Schneier on Security

Lockheed Martin Hack Linked to RSA's SecurID Breach

All I know is what I read in the news.

Aggressive Social Engineering Against Consumers
From Schneier on Security

Aggressive Social Engineering Against Consumers

Cyber criminals are getting aggressive with their social engineering tactics. Val Christopherson said she received a telephone call last Tuesday from a man stating...

Friday Squid Blogging: Hand-Cut Paper Silhouette
From Schneier on Security

Friday Squid Blogging: Hand-Cut Paper Silhouette

Surprisingly pretty.

Apple's iOS 4 Hardware Encryption Cracked
From Schneier on Security

Apple's iOS 4 Hardware Encryption Cracked

All I know is what's in these two blog posts from Elcomsoft. Note that they didn't break AES-256; they figured out how to extract the keys from the hardware (iPhones...

U.S. Presidential Limo Defeated by Steep-Grade Parking Ramp
From Schneier on Security

U.S. Presidential Limo Defeated by Steep-Grade Parking Ramp

It's not something I know anything about -- actually, it's not something many people know about -- but I've posted some links about the security features of the...

Black Box Records in Automobiles
From Schneier on Security

Black Box Records in Automobiles

Proposed new rules in the U.S.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account