acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Interview with TSA Administrator John Pistole
From Schneier on Security

Interview with TSA Administrator John Pistole

He's more realistic than one normally hears: So if they get through all those defenses, they get to Reagan [National Airport] over here, and they've got an underwear...

Adam Shostack on TSA Threat Modeling
From Schneier on Security

Adam Shostack on TSA Threat Modeling

Good commentary: I've said before and I'll say again, there are lots of possible approaches to threat modeling, and they all involve tradeoffs. I've commentedthe...

Recording the Police
From Schneier on Security

Recording the Police

I've written a lot on the "War on Photography," where normal people are harassed as potential terrorists for taking pictures of things in public. This article...

Book Review: <i>Cyber War</i>
From Schneier on Security

Book Review: Cyber War

Cyber War: The Next Threat to National Security and What to do About It by Richard Clarke and Robert Knake, HarperCollins, 2010. Cyber War is a fast and enjoyable...

Computational Forensics
From Schneier on Security

Computational Forensics

Interesting article from IEEE Spectrum: During two years of deliberation by the National Academy's forensic science committee (of which I was a member), a troubling...

"Architecture of Fear"
From Schneier on Security

"Architecture of Fear"

I like the phrase: N

Friday Squid Blogging: Prosthetic Tentacle
From Schneier on Security

Friday Squid Blogging: Prosthetic Tentacle

Impressive: Designed for a class project while getting her degree at the Industrial Design Department at the University of Washington, Kaylene Kau has not only...

Hiding PETN from Full-Body Scanners
From Schneier on Security

Hiding PETN from Full-Body Scanners

From the Journal of Transporation Security, "An evaluation of airport x-ray backscatter units based on image characteristics," by Leon Kaufman and Joseph W. Carlson...

Did the FBI Plant Backdoors in OpenBSD?
From Schneier on Security

Did the FBI Plant Backdoors in OpenBSD?

It has been accused of it. I doubt this is true. One, it's a very risky thing to do. And two, there are more than enough exploitable security vulnerabilities...

Fake Amazon Receipt Generators
From Schneier on Security

Fake Amazon Receipt Generators

They can be used to scam Amazon Marketplace merchants: What happens once our scammer is armed with his fake receipt? Well, many sellers on Amazon will ask you...

Security in 2020
From Schneier on Security

Security in 2020

There’s really no such thing as security in the abstract. Security can only be defined in relation to something else. You’re secure from something or against something...

Open Source Digital Forensics
From Schneier on Security

Open Source Digital Forensics

A good resource.

Realistic Masks
From Schneier on Security

Realistic Masks

They're causing problems: A white bank robber in Ohio recently used a "hyper-realistic" mask manufactured by a small Van Nuys company to disguise himself as a...

Evan Kohlmann
From Schneier on Security

Evan Kohlmann

Interesting profile of Evan Kohlmann: Evan Kohlmann spends his days lurking in the darkest corners of the Internet, where jihadists recruit sympathizers from across...

Proprietary Encryption in Car Immobilizers Cracked
From Schneier on Security

Proprietary Encryption in Car Immobilizers Cracked

This shouldn't be a surprise: Karsten Nohl's assessment of dozens of car makes and models found weaknesses in the way immobilisers are integrated with the rest...

Sometimes CCTV Cameras Work
From Schneier on Security

Sometimes CCTV Cameras Work

Sex attack caught on camera. Hamilton police have arrested two men after a sex attack on a woman early today was caught on the city's closed circuit television...

CRB Check Backlash
From Schneier on Security

CRB Check Backlash

Against stupid CRB checks: Last January, Annabel Hayter, chairwoman of Gloucester Cathedral Flower Guild, received an email saying that she and her 60 fellow flower...

Friday Squid Blogging: Glowing Squid
From Schneier on Security

Friday Squid Blogging: Glowing Squid

Recent research. And an older video.

New TSA Security Test
From Schneier on Security

New TSA Security Test

I experienced a new TSA security check at Phoenix Airport last Thursday. The agent took my over-three-ounce bottle of saline, put a drop of it on a white cardboard...

NIST Announces SHA-3 Finalists (Skein is One of Them)
From Schneier on Security

NIST Announces SHA-3 Finalists (Skein is One of Them)

Yesterday, NIST announced the five hash functions to advance to the third (and final) round in the SHA-3 selection process: BLAKE, Grøstl, JH, Keccak, and Skein...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account