acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Psychopaths and Security
From Schneier on Security

Psychopaths and Security

I have been thinking a lot about security against psychopaths. Or, at least, how we have traditionally secured social systems against these sorts of people, and...

The Withdrawal of the A5/2 Encryption Algorithm
From Schneier on Security

The Withdrawal of the A5/2 Encryption Algorithm

Interesting story of the withdrawal of the A5/2 encryption algorithm from GSM phones.

The DHS is Getting Rid of the Color-Coded Terrorism Alert System
From Schneier on Security

The DHS is Getting Rid of the Color-Coded Terrorism Alert System

Good. It was always a dumb idea: The color-coded threat levels were doomed to fail because "they don

New ATM Skimming Attack
From Schneier on Security

New ATM Skimming Attack

In Europe, although the article doesn't say where: Many banks have fitted ATMs with devices that are designed to thwart criminals from attaching skimmers to the...

David Kahn Donates his Cryptography Collection to the National Cryptologic Museum
From Schneier on Security

David Kahn Donates his Cryptography Collection to the National Cryptologic Museum

Good for him. I think that's where my collection will be going, too.

Spoofing Geolocation
From Schneier on Security

Spoofing Geolocation

How to spoof your location on Facebook with your BlackBerry.

Me on Airport Security
From Schneier on Security

Me on Airport Security

Yesterday I participated in a New York Times "Room for Debate" discussion on airline security. My contribution is nothing I haven't said before, so I won't reprint...

Defeating al Qaeda
From Schneier on Security

Defeating al Qaeda

Rare common sense: But Gen Richards told the BBC it was not possible to defeat the Taliban or al-Qaeda militarily. "You can't. We've all said this. David Petraeus...

Stuxnet News
From Schneier on Security

Stuxnet News

Another piece of the puzzle: New research, published late last week, has established that Stuxnet searches for frequency converter drives made by Fararo Paya of...

Friday Squid Blogging: Flying Squid
From Schneier on Security

Friday Squid Blogging: Flying Squid

Photographic evidence from Jamaica.

Me on Cyberwar
From Schneier on Security

Me on Cyberwar

Last week, I gave a talk on cyberwar and cyberconflict at the Institute for International and European Affairs in Dublin. Here's the video. It was only the second...

TSA Backscatter X-ray Backlash
From Schneier on Security

TSA Backscatter X-ray Backlash

Things are happening so fast that I don't know if I should bother. But here are some links and observations. The head of the Allied Pilots Association is telling...

Airplane Terrorism Twenty Years Ago
From Schneier on Security

Airplane Terrorism Twenty Years Ago

Excellent: Here's a scenario: Middle Eastern terrorists hijack a U.S. jetliner bound for Italy. A two-week drama ensues in which the plane's occupants are split...

Unsolicited Terrorism Tips to the U.S. Government
From Schneier on Security

Unsolicited Terrorism Tips to the U.S. Government

Adding them all up, the U.S. government "receives between 8,000 and 10,000 pieces of information per day, fingering just as many different people as potential threats...

New Biometric
From Schneier on Security

New Biometric

Eye movements instead of eye structures. The new system tracks the way a person's eye moves as he watches an icon roam around a computer screen. The way the icon...

Security Haiku
From Schneier on Security

Security Haiku

These could surely be better. Anyone?

Term Paper Writing for Hire
From Schneier on Security

Term Paper Writing for Hire

This recent essay (commentary here) reminded me of this older essay, both by people who write student term papers for hire. There are several services that dopersonal...

Internet Quarantines
From Schneier on Security

Internet Quarantines

Last month, Scott Charney of Microsoft proposed that infected computers be quarantined from the Internet. Using a public health model for Internet security, the...

Friday Squid Blogging: Tentacle Pot Pie
From Schneier on Security

Friday Squid Blogging: Tentacle Pot Pie

Nice.

Albert Gonzalez
From Schneier on Security

Albert Gonzalez

Long article on convicted hacker Albert Gonzalez from The New York Times Magazine.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account