acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Brute-Force Safecracking
From Schneier on Security

Brute-Force Safecracking

This safecracking robot tries every possible combination, one after another: Combination space optimization is the key. By exploiting of the mechanical tolerances...

Blowfish in <i>Good Time Max</i>
From Schneier on Security

Blowfish in Good Time Max

This screen shot is from the movie "Good Time Max." 17 minutes and 52 seconds into the movie, it shows Blowfish being used as an encryption algorithm.

Cyberwar is Overhyped
From Schneier on Security

Cyberwar is Overhyped

A new report from the OECD says the threat of cyberwar has been grossly exaggerated. (Hey, that's what I said.) There are lots of news articles. Also worth...

The Legality of the Certificate Authority Trust Model
From Schneier on Security

The Legality of the Certificate Authority Trust Model

Interesting research: We looked at the standard legal documents issued by the certificate authorities or "CAs," including exemplar Subscriber Agreements (agreements...

Cost-Benefit Analysis of Full-Body Scanners
From Schneier on Security

Cost-Benefit Analysis of Full-Body Scanners

Research paper from Mark Stewart and John Mueller: The Transportation Security Administration (TSA) has been deploying Advanced Imaging Technologies (AIT) that...

Do Corporations Have a Right to Privacy?
From Schneier on Security

Do Corporations Have a Right to Privacy?

This week, the U.S. Supreme Court will hear arguments about whether or not corporations have the same rights to "personal privacy" that individuals do. Thisbrief...

Odd Art Forger
From Schneier on Security

Odd Art Forger

He's not in it for the money: Mr. Landis...has been one of the most prolific forgers American museums have encountered in years, writing, calling and presenting...

Movie-Plot Threats at the U.S. Capitol
From Schneier on Security

Movie-Plot Threats at the U.S. Capitol

This would make a great movie: Rep. Dan Burton, R-Ind., renewed his call for the installation of an impenetrable, see-through security shield around the viewing...

More Stuxnet News
From Schneier on Security

More Stuxnet News

This long New York Times article includes some interesting revelations. The article claims that Stuxnet was a joint Israeli-American project, and that its effectiveness...

New Revelations in the Mahmoud al-Mabhouh Assassination
From Schneier on Security

New Revelations in the Mahmoud al-Mabhouh Assassination

I wrote a lot last year about the assassination of Mahmoud al-Mabhouh in Dubai. There's a new article by an Israeli investigative journalist that tells the story...

Friday Squid Blogging: Deep-Sea Squid Video
From Schneier on Security

Friday Squid Blogging: Deep-Sea Squid Video

"Anthology of Deep-Sea Squids," from the Monterey Bay Aquarium.

Me on Airport Security
From Schneier on Security

Me on Airport Security

Last week, I spoke at an airport security conference hosted by EPIC: The Stripping of Freedom: A Careful Scan of TSA Security Procedures. Here's the video of my...

Loaded Gun Slips Past TSA
From Schneier on Security

Loaded Gun Slips Past TSA

I'm not really worried about mistakes like this. Sure, a gun slips through occasionally, and a knife slips through even more often. (I'm sure the TSA doesn't catch...

Surviving a Terrorist's Nuclear Attack
From Schneier on Security

Surviving a Terrorist's Nuclear Attack

Interesting reading, mostly for the probable effects of a terrorist-sized nuclear bomb. A terrorist bomb is likely to be relatively small -- possibly only a fraction...

Stealing SIM Cards from Traffic Lights
From Schneier on Security

Stealing SIM Cards from Traffic Lights

Johannesburg installed hundreds of networked traffic lights on its streets. The lights use a cellular modem and a SIM card to communicate. Those lights introduced...

The Security Threat of Forged Law-Enforcement Credentials
From Schneier on Security

The Security Threat of Forged Law-Enforcement Credentials

Here's a U.S. Army threat assessment of forged law-enforcement credentials. The authors bought a bunch of fake badges: Between November 2009 and March 2010, undercover...

Attacking High-Frequency Trading Networks
From Schneier on Security

Attacking High-Frequency Trading Networks

Turns out you can make money by manipulating the network latency. cPacket has developed a proof of concept showing that these side-channel attacks can be usedthis...

"Homeland Security Hasn't Made Us Safer"
From Schneier on Security

"Homeland Security Hasn't Made Us Safer"

This will be nothing new to readers of this blog, but it's nice to read other people saying it too.

James Fallows on Political Shootings
From Schneier on Security

James Fallows on Political Shootings

Interesting: So the train of logic is: anything that can be called an "assassination" is inherently political; very often the "politics" are obscure, personal...

Friday Squid Blogging: Biggest Squid Ever
From Schneier on Security

Friday Squid Blogging: Biggest Squid Ever

It's an oil field: Brazil's state-run Petrobras confirmed Wednesday that oil fields recently discovered offshore contained 8.3 billion barrels of recoverable crude...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account