acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Scareware: How Crime Pays
From Schneier on Security

Scareware: How Crime Pays

Scareware is fraudulent software that uses deceptive advertising to trick users into believing they're infected with some variety of malware, then convinces them...

Friday Squid Blogging: Reducing Squid Odor
From Schneier on Security

Friday Squid Blogging: Reducing Squid Odor

Research from Japan: "Improvement of 'kurozukuri ika-shiokara' (fermented squid meat with ink) odor with Staphylococcus nepalensis isolated from the fish sauce...

UK Immigration Officer Puts Wife on the No-Fly List
From Schneier on Security

UK Immigration Officer Puts Wife on the No-Fly List

A UK immigration officer decided to get rid of his wife by putting her on the no-fly list, ensuring that she could not return to the UK from abroad. This worked...

Terrorist Targets of Choice
From Schneier on Security

Terrorist Targets of Choice

This makes sense. Generally, militants prefer to attack soft targets where there are large groups of people, that are symbolic and recognizable around the world...

ATM Skimmer on Bank Door Lock
From Schneier on Security

ATM Skimmer on Bank Door Lock

This is a clever development in ATM skimming technology. It's a skimmer that attaches to the ATM-room door lock, not the ATM itself. Combined with a hidden camera...

Hacking HTTP Status Codes
From Schneier on Security

Hacking HTTP Status Codes

One website can learn if you're logged into other websites. When you visit my website, I can automatically and silently determine if you're logged into Facebook...

Kip Hawley Comments on the Domodedovo Airport Bombing
From Schneier on Security

Kip Hawley Comments on the Domodedovo Airport Bombing

This is the first piece of writing I've seen from Kip Hawley since he left the TSA in 2009. It's mostly generalities and platitudes.

Me on Color-Coded Terrorist Threat Levels
From Schneier on Security

Me on Color-Coded Terrorist Threat Levels

I wrote an op-ed for CNN.com on the demise of the color-coded terrorist theat level system. It's nothing I haven't said before, so I won't reprint it here. The...

Jury Says it's Okay to Record the TSA
From Schneier on Security

Jury Says it's Okay to Record the TSA

The Seattle man who refused to show ID to the TSA and recorded the whole incident has been cleared of all charges: [The jury] returned not guilty verdicts forPapers...

Trojan Steals Credit Card Numbers
From Schneier on Security

Trojan Steals Credit Card Numbers

It's only a proof of concept, but it's scary nonetheless. It's a Trojan for Android phones that looks for credit-card numbers, either typed or spoken, and relays...

Domodedovo Airport Bombing
From Schneier on Security

Domodedovo Airport Bombing

I haven't written anything about the suicide bombing at Moscow's Domodedovo Airport because I didn't think there was anything to say. The bomber was outside the...

$100 to Put a Bomb on an Airplane
From Schneier on Security

$100 to Put a Bomb on an Airplane

An undercover TSA agent successfully bribed JetBlue ticket agent to check a suitcase under a random passenger's name and put it on an airplane. As with a lot of...

Whitelisting vs. Blacklisting
From Schneier on Security

Whitelisting vs. Blacklisting

The whitelist/blacklist debate is far older than computers, and it's instructive to recall what works where. Physical security works generally on a whitelist model...

Security Theater, Illustrated
From Schneier on Security

Security Theater, Illustrated

Security theater, illustrated.

U.S. Strategy to Prevent Leaks is Leaked
From Schneier on Security

U.S. Strategy to Prevent Leaks is Leaked

As the article says, it doesn't get any more ironic than that. More importantly, it demonstrates how hard it is to keep secrets in the age of the Internet. ...

Security Theater in the Theater
From Schneier on Security

Security Theater in the Theater

This is a bit surreal: Additional steps are needed to prepare Broadway theaters in New York City for a potential WMD attack or other crisis, a New York state legislature...

Unsecured IP Security Cameras
From Schneier on Security

Unsecured IP Security Cameras

It's amazing how many security cameras are on the Internet, accessible by anyone. And it's not just for viewing; a lot of these cameras can be reprogrammed by...

Bioencryption
From Schneier on Security

Bioencryption

A group of students at the Chinese University in Hong Kong have figured out how to store data in bacteria. The article talks about how secure it is, and the students...

REAL-ID Implementation
From Schneier on Security

REAL-ID Implementation

According to this study, REAL-ID has not only been cheaper to implement than the states estimated, but also helpful in reducing fraud. States are finding that...

Hacking Tamper-Evident Devices
From Schneier on Security

Hacking Tamper-Evident Devices

At the Black Hat conference lasts week, Jamie Schwettmann and Eric Michaud presented some great research on hacking tamper-evident seals. Jamie Schwettmann and...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account