acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Steganography in the Longfin Inshore Squid
From Schneier on Security

Steganography in the Longfin Inshore Squid

Really: While the notion that a few animals produce polarization signals and use them in communication is not new, M

Video Interview with Me from RSA Europe
From Schneier on Security

Video Interview with Me from RSA Europe

I was interviewed this week at RSA Europe.

FaceTime for Mac Security Hole
From Schneier on Security

FaceTime for Mac Security Hole

Once a user has logged into FaceTime, anyone with access to the machine can change the user's Apple ID password without knowing the old password.

Electronic Car Lock Denial-of-Service Attack
From Schneier on Security

Electronic Car Lock Denial-of-Service Attack

Clever: Inspector Richard Haycock told local newspapers that the possible use of the car lock jammers would help explain a recent spate of thefts from vehicles...

Workshop on the Economics of Information Security
From Schneier on Security

Workshop on the Economics of Information Security

I am the program chair for WEIS 2011, which is to be held next June in Washington, DC. Submissions are due at the end of February. Please forward and repost the...

Predator Software Pirated?
From Schneier on Security

Predator Software Pirated?

This isn't good: Intelligent Integration Systems (IISi), a small Boston-based software development firm, alleges that their Geospatial Toolkit and Extended SQL...

Hiding in Plain Sight
From Schneier on Security

Hiding in Plain Sight

Ha! When he's out and about near his Denver home, former Broncos quarterback John Elway has come up with a novel way to travel incognito

Fingerprinting Telephone Calls
From Schneier on Security

Fingerprinting Telephone Calls

This is clever: The tool is called PinDr0p, and works by analysing the various characteristic noise artifacts left in audio by the different types of voice network...

Indian OS
From Schneier on Security

Indian OS

India is writing its own operating system so it doesn't have to rely on Western technology: India's Defence Research and Development Organisation (DRDO) wants...

Picking a Single Voice out of a Crowd
From Schneier on Security

Picking a Single Voice out of a Crowd

Interesting new technology. Squarehead's new system is like bullet-time for sound. 325 microphones sit in a carbon-fiber disk above the stadium, and a wide-angle...

Pen-and-Paper SQL Injection Attack Against Swedish Election
From Schneier on Security

Pen-and-Paper SQL Injection Attack Against Swedish Election

Some copycat imitated this xkcd cartoon in Sweden, hand writing an SQL injection attack onto a paper ballot. Even though the ballot was manually entered into the...

The FBI is Tracking Whom?
From Schneier on Security

The FBI is Tracking Whom?

They're tracking a college student in Silicon Valley. He's 20, partially Egyptian, and studying marketing at Mission College. He found the tracking device attached...

The Mahmoud al-Mabhouh Assassination
From Schneier on Security

The Mahmoud al-Mabhouh Assassination

Remember the Mahmoud al-Mabhouh assassination last January? The police identified 30 suspects, but haven't been able to find any of them. Police spent about 10...

<i>The Economist</i> on Biometrics
From Schneier on Security

The Economist on Biometrics

Good article. Here's my essay on biometrics, from 1999.

Friday Squid Blogging: Squid's Restaurant
From Schneier on Security

Friday Squid Blogging: Squid's Restaurant

In Chapel Hill, NC.

The Ineffectiveness of Vague Security Warnings
From Schneier on Security

The Ineffectiveness of Vague Security Warnings

From Slate: We do nothing, first and foremost, because there is nothing we can do. Unless the State Department gets specific

Hacking Trial Breaks D.C. Internet Voting System
From Schneier on Security

Hacking Trial Breaks D.C. Internet Voting System

Sounds like it was easy: Last week, the D.C. Board of Elections and Ethics opened a new Internet-based voting system for a weeklong test period, inviting computer...

The Politics of Allocating Homeland Security Money to States
From Schneier on Security

The Politics of Allocating Homeland Security Money to States

From the Journal of Homeland Security and Emergency Management: "Politics or Risks? An Analysis of Homeland Security Grant Allocations to the States." Abstract...

Stuxnet
From Schneier on Security

Stuxnet

Computer security experts are often surprised at which stories get picked up by the mainstream media. Sometimes it makes no sense. Why this particular data breach...

Putting Unique Codes on Objects to Detect Counterfeiting
From Schneier on Security

Putting Unique Codes on Objects to Detect Counterfeiting

This will help some. At least two rival systems plan to put unique codes on packages containing antimalarials and other medications. Buyers will be able to text...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account