acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Friday Squid Blogging: Biggest Squid Ever
From Schneier on Security

Friday Squid Blogging: Biggest Squid Ever

It's an oil field: Brazil's state-run Petrobras confirmed Wednesday that oil fields recently discovered offshore contained 8.3 billion barrels of recoverable crude...

The Social Dynamics of Terror
From Schneier on Security

The Social Dynamics of Terror

Good essay: Nineteenth-century anarchists promoted what they called the "propaganda of the deed," that is, the use of violence as a symbolic action to make a larger...

SMS of Death
From Schneier on Security

SMS of Death

This will be hard to fix: Using only Short Message Service (SMS) communications

Sony PS3 Security Broken
From Schneier on Security

Sony PS3 Security Broken

Sony used an ECDSA signature scheme to protect the PS3. Trouble is, they didn't pay sufficient attention to their random number generator.

Eavesdropping on GSM Calls
From Schneier on Security

Eavesdropping on GSM Calls

It's easy and cheap: Speaking at the Chaos Computer Club (CCC) Congress in Berlin on Tuesday, a pair of researchers demonstrated a start-to-finish means of eavesdropping...

Guard Towers at WalMart
From Schneier on Security

Guard Towers at WalMart

This feels very creepy and police-state-like. What on earth could WalMart be worried about?

Polar Bears Destroying Hidden Cameras
From Schneier on Security

Polar Bears Destroying Hidden Cameras

Watch the video. What valuable security lessons does this teach? EDITED TO ADD (1/3): And why aren't the polar bears destroying the hidden cameras that are...

Friday Squid Blogging: Research into Squid Skin
From Schneier on Security

Friday Squid Blogging: Research into Squid Skin

DoD awarded a $6M grant to study squid skin: "Our internal nickname for this project is 'squid skin,' but it is really about fundamental research," said Naomi...

Tor Routers
From Schneier on Security

Tor Routers

Home routers that automatically run Tor.

Civil War Message Decoded
From Schneier on Security

Civil War Message Decoded

Interesting.

TSA Inspecting Thermoses
From Schneier on Security

TSA Inspecting Thermoses

This is new: Adm. James Winnefeld told The Associated Press Friday that the Transportation Security Administration is "always trying to think ahead." Winnefeld...

Terrorism Reading List
From Schneier on Security

Terrorism Reading List

Interesting interview, discussing five books (none of which I've read, by the way).

An Honest Privacy Policy
From Schneier on Security

An Honest Privacy Policy

Funny: The data we collect is strictly anonymous, unless you've been kind enough to give us your name, email address, or other identifying information. And even...

This Suspicious Photography Stuff Is Confusing
From Schneier on Security

This Suspicious Photography Stuff Is Confusing

See: Last week, Metro Transit Police received a report from a rider about suspicious behavior at the L'Enfant Plaza station and on an Orange Line train to Vienna...

Garfield Comic
From Schneier on Security

Garfield Comic

Merry Christmas.

Friday Squid Blogging: Great Flying Squid Photo
From Schneier on Security

Friday Squid Blogging: Great Flying Squid Photo

Great photo.

Friday Squid Blogging: Squid Nativity
From Schneier on Security

Friday Squid Blogging: Squid Nativity

Merry Christmas.

PlugBot
From Schneier on Security

PlugBot

Interesting: PlugBot is a hardware bot. It's a covert penetration testing device designed for use during physical penetration tests. PlugBot is a tiny computer...

Cyberwar Movie Plot from an Actual Thriller Writer
From Schneier on Security

Cyberwar Movie Plot from an Actual Thriller Writer

It could make a good movie.

Interview with the European Union Privacy Chief
From Schneier on Security

Interview with the European Union Privacy Chief

Interesting interview with Viviane Reding, the vice president of the EU Justice Commission and head of privacy regulation: The basic values in Europe are that...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account