acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Large-Scale Food Theft
From Schneier on Security

Large-Scale Food Theft

A criminal gang is stealing truckloads of food: Late last month, a gang of thieves stole six tractor-trailer loads of tomatoes and a truck full of cucumbers from...

Costs of Security
From Schneier on Security

Costs of Security

Interesting blog post on the security costs for the $50B Air Force bomber program -- estimated to be $8B. This isn't all computer security, but the original article...

Software as Evidence
From Schneier on Security

Software as Evidence

Increasingly, chains of evidence include software steps. It's not just the RIAA suing people -- and getting it wrong -- based on automatic systems to detect and...

WikiLeaks Cable about Chinese Hacking of U.S. Networks
From Schneier on Security

WikiLeaks Cable about Chinese Hacking of U.S. Networks

We know it's prevalent, but there's some new information: Secret U.S. State Department cables, obtained by WikiLeaks and made available to Reuters by a third party...

Friday Squid Blogging: Omega 3 Oil from Squid
From Schneier on Security

Friday Squid Blogging: Omega 3 Oil from Squid

New health supplement.

"Schneier's Law"
From Schneier on Security

"Schneier's Law"

Back in 1998, I wrote: Anyone, from the most clueless amateur to the best cryptographer, can create an algorithm that he himself can't break. In 2004, Cory Doctorow...

Unanticipated Security Risk of Keeping Your Money in a Home Safe
From Schneier on Security

Unanticipated Security Risk of Keeping Your Money in a Home Safe

In Japan, lots of people -- especially older people -- keep their life savings in cash in their homes. (The country's banks pay very low interest rates, so the...

Changing Incentives Creates Security Risks
From Schneier on Security

Changing Incentives Creates Security Risks

One of the things I am writing about in my new book is how security equilibriums change. They often change because of technology, but they sometimes change because...

Security Fears of Wi-Fi in London Underground
From Schneier on Security

Security Fears of Wi-Fi in London Underground

The London Underground is getting Wi-Fi. Of course there are security fears: But Will Geddes, founder of ICP Group which specialises in reducing terror or technology...

Euro Coin Recycling Scam
From Schneier on Security

Euro Coin Recycling Scam

This story is just plain weird. Regularly, damaged coins are taken out of circulation. They're destroyed and then sold to scrap metal dealers. That makes sense...

Israel's Counter-Cyberterrorism Unit
From Schneier on Security

Israel's Counter-Cyberterrorism Unit

You'd think the country would already have one of these: Israel is mulling the creation of a counter-cyberterrorism unit designed to safeguard both government...

How did the CIA and FBI Know that Australian Government Computers were Hacked?
From Schneier on Security

How did the CIA and FBI Know that Australian Government Computers were Hacked?

Newspapers are reporting that, for about a month, hackers had access to computers "of at least 10 federal ministers including the Prime Minister, Foreign Minister...

New French Law Reduces Website Security
From Schneier on Security

New French Law Reduces Website Security

I didn't know about this: The law obliges a range of e-commerce sites, video and music services and webmail providers to keep a host of data on customers. This...

The CIA and Assassinations
From Schneier on Security

The CIA and Assassinations

The former CIA general counsel, John A. Rizzo, talks about his agency's assassination program, which has increased dramatically under the Obama administration: ...

Friday Squid Blogging: A New Book About Squid
From Schneier on Security

Friday Squid Blogging: A New Book About Squid

Wendy Williams, Kraken: The Curious, Exciting, and Slightly Disturbing Science of Squid. Kraken is the traditional name for gigantic sea monsters, and this book...

Get Your Terrorist Alerts on Facebook and Twitter
From Schneier on Security

Get Your Terrorist Alerts on Facebook and Twitter

Colors are so last decade: The U.S. government's new system to replace the five color-coded terror alerts will have two levels of warnings

Pinpointing a Computer to Within 690 Meters
From Schneier on Security

Pinpointing a Computer to Within 690 Meters

This is impressive, and scary: Every computer connected to the web has an internet protocol (IP) address, but there is no simple way to map this to a physical...

Detecting Cheaters
From Schneier on Security

Detecting Cheaters

Our brains are specially designed to deal with cheating in social exchanges. The evolutionary psychology explanation is that we evolved brain heuristics formodus...

Optical Stun Ray
From Schneier on Security

Optical Stun Ray

It's been patented; no idea if it actually works. ...newly patented device can render an assailant helpless with a brief flash of high-intensity light. It works...

Counterterrorism Security Cost-Benefit Analysis
From Schneier on Security

Counterterrorism Security Cost-Benefit Analysis

"Terror, Security, and Money: Balancing the Risks, Benefits, and Costs of Homeland Security," by John Mueller and Mark Stewart: Abstract:The cumulative increase...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account