acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Friday Squid Blogging: Plush Squid
From Schneier on Security

Friday Squid Blogging: Plush Squid

Very cute.

CDC on the Zombie Apocalypse
From Schneier on Security

CDC on the Zombie Apocalypse

The Centers for Disease Control and Prevention weigh in on preparations for the zombie apocalypse.

The Normalization of Security
From Schneier on Security

The Normalization of Security

TSA-style security is now so normal that it's part of a Disney ride: The second room of the queue is now a security check area, similar to a TSA checkpoint. The...

Forged Subway Passes in Boston
From Schneier on Security

Forged Subway Passes in Boston

For years, an employee of Cubic Corp -- the company who makes the automatic fair card systems for most of the subway systems around the world -- forged forged and...

BIOS Protection
From Schneier on Security

BIOS Protection

NIST has released "BIOS Protection Guidelines."

Bin Laden Maintained Computer Security with an Air Gap
From Schneier on Security

Bin Laden Maintained Computer Security with an Air Gap

From the Associated Ptress: Bin Laden's system was built on discipline and trust. But it also left behind an extensive archive of email exchanges for the U.S....

Mobile Phone Privacy App Contest
From Schneier on Security

Mobile Phone Privacy App Contest

Entries due by the end of the month.

Fingerprint Scanner that Works at a Distance
From Schneier on Security

Fingerprint Scanner that Works at a Distance

Scanning fingerprints from six feet away. Slightly smaller than a square tissue box, AIRprint houses two 1.3 megapixel cameras and a source of polarized light....

The Inner Workings of an FBI Surveillance Device
From Schneier on Security

The Inner Workings of an FBI Surveillance Device

This FBI surveillance device, designed to be attached to a car, has been taken apart and analyzed. A recent ruling by the 9th U.S. Circuit Court of Appeals affirms...

Friday Squid Blogging: Squid <i>Sous Vide</i>
From Schneier on Security

Friday Squid Blogging: Squid Sous Vide

Yum: We learned to cook squid sous vide at 59

Interview with Me About the Sony Hack
From Schneier on Security

Interview with Me About the Sony Hack

These are what I get for giving interviews when I'm in a bad mood. For the record, I think Sony did a terrible job with its customers' security. I also think...

Drugging People and Then Robbing Them
From Schneier on Security

Drugging People and Then Robbing Them

This is a pretty scary criminal tactic from Turkey. Burglars dress up as doctors, and ring doorbells handing out pills under some pretense or another. They're...

FBI Surveillance Tools
From Schneier on Security

FBI Surveillance Tools

Interesting blog post from EFF.

RFID Tags Protecting Hotel Towels
From Schneier on Security

RFID Tags Protecting Hotel Towels

The stealing of hotel towels isn't a big problem in the scheme of world problems, but it can be expensive for hotels. Sure, we have moral prohibitions againstmore...

"Resilience of the Internet Interconnection Ecosystem"
From Schneier on Security

"Resilience of the Internet Interconnection Ecosystem"

This blog post by Richard Clayton is worth reading. If you have more time, there's 238-page report and a 31-page executive summary.

Medieval Tally Stick Discovered in Germany
From Schneier on Security

Medieval Tally Stick Discovered in Germany

Interesting: The well-preserved tally stick was used in the Middle Ages to count the debts owed by the holder in a time when most people were unable to read or...

The Era of "Steal Everything"
From Schneier on Security

The Era of "Steal Everything"

Good comment: "We're moving into an era of 'steal everything'," said David Emm, a senior security researcher for Kaspersky Labs. He believes that cyber criminals...

Vulnerabilities in Online Payment Systems
From Schneier on Security

Vulnerabilities in Online Payment Systems

This hack was conducted as a research project. It's unlikely it's being done in the wild: In one attack, Wang and colleagues used a plug-in for the Firefox web...

Status Report: <i>The Dishonest Minority</i>
From Schneier on Security

Status Report: The Dishonest Minority

Three months ago, I announced that I was writing a book on why security exists in human societies. This is basically the book's thesis statement: All complex...

Friday Squid Blogging: Noise Pollution and Squid
From Schneier on Security

Friday Squid Blogging: Noise Pollution and Squid

It literally blows holes in their heads: In the study, led by Michel Andr
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account