acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Problems with Twitter's OAuth Authentication System
From Schneier on Security

Problems with Twitter's OAuth Authentication System

Interesting case study.  

Orange Balls as an Anti-Robbery Device
From Schneier on Security

Orange Balls as an Anti-Robbery Device

In Japan: These balls full of orange paint are anti-theft devices. When someone robs a store, the clerk can throw the ball at the perp (or at the perp's feet)...

New German ID Card Hackable
From Schneier on Security

New German ID Card Hackable

No surprise.

Parental Fears vs. Realities
From Schneier on Security

Parental Fears vs. Realities

From NPR: Based on surveys Barnes collected, the top five worries of parents are, in order: Kidnapping School snipers Terroristsknows,...

Consumerization and Corporate IT Security
From Schneier on Security

Consumerization and Corporate IT Security

If you're a typical wired American, you've got a bunch of tech tools you like and a bunch more you covet. You have a cell phone that can easily text. You've got...

Terrorism Entrapment
From Schneier on Security

Terrorism Entrapment

Back in 2007, I wrote an essay, "Portrait of the Modern Terrorist as an Idiot," where I said: The JFK Airport plotters seem to have been egged on by an informant...

Friday Squid Blogging: Squid Car
From Schneier on Security

Friday Squid Blogging: Squid Car

Squid car.

UAE Man-in-the-Middle Attack Against SSL
From Schneier on Security

UAE Man-in-the-Middle Attack Against SSL

Interesting: Who are these certificate authorities? At the beginning of Web history, there were only a handful of companies, like Verisign, Equifax, and Thawte...

Successful Attack Against a Quantum Cryptography System
From Schneier on Security

Successful Attack Against a Quantum Cryptography System

Clever: Quantum cryptography is often touted as being perfectly secure. It is based on the principle that you cannot make measurements of a quantum system without...

Cyber-Offence is the New Cyber-Defense
From Schneier on Security

Cyber-Offence is the New Cyber-Defense

This is beyond stupid: The Pentagon is contemplating an aggressive approach to defending its computer systems that includes preemptive actions such as knocking...

Wanted: Skein Hardware Help
From Schneier on Security

Wanted: Skein Hardware Help

As part of NIST's SHA-3 selection process, people have been implementing the candidate hash functions on a variety of hardware and software platforms. Our team...

More Skein News
From Schneier on Security

More Skein News

Skein is my new hash function. Well, "my" is an overstatement; I'm one of the eight designers. It was submitted to NIST for their SHA-3 competition, and oneselected...

Eavesdropping on Smart Homes with Distributed Wireless Sensors
From Schneier on Security

Eavesdropping on Smart Homes with Distributed Wireless Sensors

"Protecting your daily in-home activity information from a wireless snooping attack," by Vijay Srinivasan, John Stankovic, and Kamin Whitehouse: Abstract: In...

High School Teacher Assigns Movie-Plot Threat Contest Problem
From Schneier on Security

High School Teacher Assigns Movie-Plot Threat Contest Problem

In Australia: A high school teacher who assigned her class to plan a terrorist attack that would kill as many innocent people as possible had no intent to promote...

Misidentification and the Court System
From Schneier on Security

Misidentification and the Court System

Chilling: How do most wrongful convictions come about? The primary cause is mistaken identification. Actually, I wouldn't call it mistaken identification; I'd...

Security Theater on the Boston T
From Schneier on Security

Security Theater on the Boston T

Since a fatal crash a few years ago, Boston T (their subway) operators have been forbidden from using -- or even having -- cell phones while on the job. Passengers...

Friday Squid Blogging: Jewel of the Sea
From Schneier on Security

Friday Squid Blogging: Jewel of the Sea

Pretty.

Me at the EastWest Institute
From Schneier on Security

Me at the EastWest Institute

Back in May, I attended the EastWest Institute's First Worldwide Cybersecurity Summit in Dallas. I only had eight minutes to speak, and tried to turn the dialog...

Is the Whole Country an Airport Security Zone?
From Schneier on Security

Is the Whole Country an Airport Security Zone?

Full-body scanners in roving vans: American Science & Engineering, a company based in Billerica, Massachusetts, has sold U.S. and foreign government agencies more...

Detecting Deception in Conference Calls
From Schneier on Security

Detecting Deception in Conference Calls

Research paper: Detecting Deceptive Discussions in Conference Calls, by David F. Larcker and Anastasia A. Zakolyukina. Abstract: We estimate classification models...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account