acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Analysis of Image File Metadata
From Schneier on Security

Analysis of Image File Metadata

As a photographer, I've wondered about this.

Evercookies
From Schneier on Security

Evercookies

Extremely persistent browser cookies: evercookie is a javascript API available that produces extremely persistent cookies in a browser. Its goal is to identify...

Details Removed from Book at Request of U.S. Department of Defense
From Schneier on Security

Details Removed from Book at Request of U.S. Department of Defense

From the AFP: A publisher has agreed to remove US intelligence details from a memoir by a former army officer in Afghanistan after the Pentagon raised last-minute...

The Stuxnet Worm
From Schneier on Security

The Stuxnet Worm

It's impressive: The Stuxnet worm is a "groundbreaking" piece of malware so devious in its use of unpatched vulnerabilities, so sophisticated in its multipronged...

Prepaid Electricity Meter Fraud
From Schneier on Security

Prepaid Electricity Meter Fraud

New attack: Criminals across the UK have hacked the new keycard system used to top up pre-payment energy meters and are going door-to-door, dressed as power company...

Haystack
From Schneier on Security

Haystack

I stayed clear of Haystack -- the anonymity program that was going to protect the privacy of dissidents the world over -- because I didn't have enough details about...

Statistical Distribution of Combat Wounds to the Head
From Schneier on Security

Statistical Distribution of Combat Wounds to the Head

This is interesting: The study, led by physician Yuval Ran, looked at Israeli combat deaths from 2000 to 2004 and tracked where bullet entries appeared on the...

Four Irrefutable Security Laws
From Schneier on Security

Four Irrefutable Security Laws

This list is from Malcolm Harkins, Intel's chief information security officer, and it's a good one (from a talk at Forrester's Security Forum): Users want...

Questioning Terrorism Policy
From Schneier on Security

Questioning Terrorism Policy

Worth reading: ...what if we chose to accept the fact that every few years, despite all reasonable precautions, some hundreds or thousands of us may die in the...

Friday Squid Blogging: Squid Eyes
From Schneier on Security

Friday Squid Blogging: Squid Eyes

Squid eyes.

Master HDCP Key Cracked
From Schneier on Security

Master HDCP Key Cracked

The master key for the High-Bandwidth Digital Content Protection standard -- that's what encrypts digital television between set-top boxes and digital televisions...

Automatic Document Declassification
From Schneier on Security

Automatic Document Declassification

DARPA is looking for something that can automatically declassify documents: I'll be honest: I'm not exactly sure what kind of technological solution you can build...

DHS <i>Still</i> Worried About Terrorists Using Internet Surveillance
From Schneier on Security

DHS Still Worried About Terrorists Using Internet Surveillance

Profound analysis from the Department of Homeland Security: Detailed video obtained through live Web-based camera feeds combined with street-level and direct overhead...

Popular Usernames and Passwords
From Schneier on Security

Popular Usernames and Passwords

Graphical representation.

Highway Honeypot
From Schneier on Security

Highway Honeypot

Police set up a highway sign warning motorists that there are random stops for narcotics checks ahead, but actually search people who take the next exit.

Not Answering Questions at U.S. Customs
From Schneier on Security

Not Answering Questions at U.S. Customs

Interesting story: I was detained last night by federal authorities at San Francisco International Airport for refusing to answer questions about why I had travelled...

Vulnerabilities in US-CERT Network
From Schneier on Security

Vulnerabilities in US-CERT Network

You'd think US-CERT would do somewhat better.

Kenzero
From Schneier on Security

Kenzero

Kenzero is a Japanese Trojan that collects and publishes users' porn surfing habits, and then blackmails them to remove the information.

Friday Squid Blogging: Cephalopod Consciousness
From Schneier on Security

Friday Squid Blogging: Cephalopod Consciousness

"Three Arguments for the Consciousness of Cephalopods."

<i>The Onion</i> on National Security
From Schneier on Security

The Onion on National Security

"Smart, Qualified People Behind the Scenes Keeping America Safe: 'We Don't Exist'"
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account