acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

"The Fear Tax"
From Schneier on Security

"The Fear Tax"

Good essay by Seth Godin: We pay the fear tax every time we spend time or money seeking reassurance. We pay it twice when the act of seeking that reassurance actually...

Crypto 2010 Proceedings
From Schneier on Security

Crypto 2010 Proceedings

The Crypto 2010 Conference is going on right now at the University of California, Santa Barbara. Springer-Verlag publishes the proceedings, but they're available...

Hacking Cars Through Wireless Tire-Pressure Sensors
From Schneier on Security

Hacking Cars Through Wireless Tire-Pressure Sensors

Still minor, but this kind of thing is only going to get worse: The new research shows that other systems in the vehicle are similarly insecure. The tire pressure...

Breaking into a Garage
From Schneier on Security

Breaking into a Garage

In seconds. Garage doors with automatic openers have always seemed like a lot of security theater to me.

Friday Squid Blogging: Squid Computer Virus
From Schneier on Security

Friday Squid Blogging: Squid Computer Virus

It wasn't me: A hardened computer hacker has been arrested on suspicion of writing a computer virus that systematically destroys all the files on victims' PCs...

Cloning Retail Gift Cards
From Schneier on Security

Cloning Retail Gift Cards

Clever attack. After researching how gift cards work, Zepeda purchased a magnetic card reader online, began stealing blank gift cards, on display for purchase,...

Security Analysis of Smudges on Smart Phone Touch Screens
From Schneier on Security

Security Analysis of Smudges on Smart Phone Touch Screens

"Smudge Attacks on Smartphone Touch Screens": Abstract: Touch screens are an increasingly common feature on personal computing devices, especially smartphones...

Late Teens and Facebook Privacy
From Schneier on Security

Late Teens and Facebook Privacy

Facebook Privacy Settings: Who Cares?" by danah boyd and Eszter Hargittai. Abstract: With over 500 million users, the decisions that Facebook makes about its...

Apple JailBreakMe Vulnerability
From Schneier on Security

Apple JailBreakMe Vulnerability

Good information from Mikko Hypp

A Revised Taxonomy of Social Networking Data
From Schneier on Security

A Revised Taxonomy of Social Networking Data

Lately I've been reading about user security and privacy -- control, really -- on social networking sites. The issues are hard and the solutions harder, but I'm...

P ? NP?
From Schneier on Security

P ? NP?

There's a new paper circulating that claims to prove that P ? NP. The paper has not been refereed, and I haven't seen any independent verifications or refutations...

Ant Warfare
From Schneier on Security

Ant Warfare

Interesting: According to Moffett, we might actually learn a thing or two from how ants wage war. For one, ant armies operate with precise organization despite...

Friday Squid Blogging: Canadian Squid Stamp
From Schneier on Security

Friday Squid Blogging: Canadian Squid Stamp

It's a giant fiberglass squid from Newfoundland.

Yet Another Way to Sneak Liquids onto an Airplane
From Schneier on Security

Yet Another Way to Sneak Liquids onto an Airplane

Coffee cup disguised as a camera lens.

More Brain Scans to Detect Future Terrorists
From Schneier on Security

More Brain Scans to Detect Future Terrorists

Worked well in a test: For the first time, the Northwestern researchers used the P300 testing in a mock terrorism scenario in which the subjects are planning,More...

NSA and the National Cryptologic Museum
From Schneier on Security

NSA and the National Cryptologic Museum

Most people might not be aware of it, but there's a National Cryptologic Museum at Ft. Meade, at NSA Headquarters. It's hard to know its exact relationship with...

WikiLeaks Insurance File
From Schneier on Security

WikiLeaks Insurance File

Now this is an interesting development: In the wake of strong U.S. government statements condemning WikiLeaks' recent publishing of 77,000 Afghan War documents...

UAE to Ban BlackBerrys
From Schneier on Security

UAE to Ban BlackBerrys

The United Arab Emirates -- Dubai, etc. -- is threatening to ban BlackBerrys because they can't eavesdrop on them. At the heart of the battle is access to thecomplicated...

Location-Based Quantum Encryption
From Schneier on Security

Location-Based Quantum Encryption

Location-based encryption -- a system by which only a recipient in a specific location can decrypt the message -- fails because location can be spoofed. Now asolved...

Eavesdropping Smartphone Apps
From Schneier on Security

Eavesdropping Smartphone Apps

Seems there are a lot of them. They do it for marketing purposes. Really, they seem to do it because the code base they use does it automatically or just because...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account