acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Book Review: How Risky Is It, Really?
From Schneier on Security

Book Review: How Risky Is It, Really?

David Ropeik is a writer and consultant who specializes in risk perception and communication. His book, How Risky Is It, Really?: Why Our Fears Don't Always Match...

Friday Squid Blogging: Squid Launcher from "Despicable Me"
From Schneier on Security

Friday Squid Blogging: Squid Launcher from "Despicable Me"

Don't squid me, bro.

Doomsday Shelters
From Schneier on Security

Doomsday Shelters

Selling fear: The Vivos network, which offers partial ownerships similar to a timeshare in underground shelter communities, is one of several ventures touting...

Hacking ATMs
From Schneier on Security

Hacking ATMs

Hacking ATMs to spit out money, demonstrated at the Black Hat conference: The two systems he hacked on stage were made by Triton and Tranax. The Tranax hack was...

Security Vulnerabilities of Smart Electricity Meters
From Schneier on Security

Security Vulnerabilities of Smart Electricity Meters

"Who controls the off switch?" by Ross Anderson and Shailendra Fuloria. Abstract: We're about to acquire a significant new cybervulnerability. The world's energy...

DNSSEC Root Key Split Among Seven People
From Schneier on Security

DNSSEC Root Key Split Among Seven People

The DNSSEC root key has been divided among seven people: Part of ICANN's security scheme is the Domain Name System Security, a security protocol that ensures Web...

Pork-Filled Counter-Islamic Bomb Device
From Schneier on Security

Pork-Filled Counter-Islamic Bomb Device

Okay, this is just weird: Mark S. Price, a specialist in public security, and his privately held company, Paradise Lost Antiterrorism Network of America (www.plan...

WPA Cracking in the Cloud
From Schneier on Security

WPA Cracking in the Cloud

It's a service: The mechanism used involves captured network traffic, which is uploaded to the WPA Cracker service and subjected to an intensive brute force cracking...

1921 Book on Profiling
From Schneier on Security

1921 Book on Profiling

Here's a book from 1921 on how to profile people.

Technology is Making Life Harder for Spies
From Schneier on Security

Technology is Making Life Harder for Spies

An article from The Economist makes a point that I have been thinking about for a while: the modern technology makes life harder for spies, not easier. It used...

Friday Squid Blogging: Squidbillies
From Schneier on Security

Friday Squid Blogging: Squidbillies

Where do these TV shows come from? Follows the adventures of the Cuylers, an impoverished and dysfunctional family of anthropomorphic, air-breathing, redneck squids...

<i>The Washington Post</i> on the U.S. Intelligence Industry
From Schneier on Security

The Washington Post on the U.S. Intelligence Industry

The Washington Post has published a phenomenal piece of investigative journalism: a long, detailed, and very interesting expose on the U.S. intelligence industry...

Internet Worm Targets SCADA
From Schneier on Security

Internet Worm Targets SCADA

Stuxnet is a new Internet worm that specifically targets Siemens WinCC SCADA systems: used to control production at industrial plants such as oil rigs, refineries...

More Research on the Effectiveness of Terrorist Profiling
From Schneier on Security

More Research on the Effectiveness of Terrorist Profiling

Interesting: The use of profiling by ethnicity or nationality to trigger secondary security screening is a controversial social and political issue. Overlooked...

Book on GCHQ
From Schneier on Security

Book on GCHQ

A book on GCHQ, and two reviews.

EU Counterterrorism Strategy
From Schneier on Security

EU Counterterrorism Strategy

Interesting journal article evaluating the EU's counterterrorism efforts.

Economic Considerations of Website Password Policies
From Schneier on Security

Economic Considerations of Website Password Policies

Two interesting research papers on website password policies. "Where Do Security Policies Come From?": Abstract: We examine the password policies of 75 different...

New GAO Cybersecurity Report
From Schneier on Security

New GAO Cybersecurity Report

From the U.S. Government Accountability Office: "Cybersecurity: Key Challenges Need to Be Addressed to Improve Research and Development." Thirty-six pages; I haven't...

Violating Terms of Service Possibly a Crime
From Schneier on Security

Violating Terms of Service Possibly a Crime

From Wired News: The four Wiseguy defendants, who also operated other ticket-reselling businesses, allegedly used sophisticated programming and inside information...

Embedded Code in U.S. Cyber Command Logo
From Schneier on Security

Embedded Code in U.S. Cyber Command Logo

This is excellent. And it's been cracked already.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account