acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Friday Squid Blogging: Squid Robots
From Schneier on Security

Friday Squid Blogging: Squid Robots

Two of them; one was blogged about last year.

Secret Stash
From Schneier on Security

Secret Stash

Hiding objects in everyday objects.

Vigilant Citizens: Then vs. Now
From Schneier on Security

Vigilant Citizens: Then vs. Now

This is from Atomic Bombing: How to Protect Yourself, published in 1950: Of course, millions of us will go through our lives never seeing a spy or a saboteur...

Cryptography Failure Story
From Schneier on Security

Cryptography Failure Story

By Russian spies: Ricci said the steganographic program was activated by pressing control-alt-E and then typing in a 27-character password, which the FBI found...

Data at Rest vs. Data in Motion
From Schneier on Security

Data at Rest vs. Data in Motion

For a while now, I've pointed out that cryptography is singularly ill-suited to solve the major network security problems of today: denial-of-service attacks, website...

Cryptography Success Story
From Schneier on Security

Cryptography Success Story

From Brazil: the moral, of course, is to choose a strong key and to encrypt the entire drive, not just key files.

Space Terrorism
From Schneier on Security

Space Terrorism

Space terrorism? Yes, space terrorism. This article, by someone at the European Space Policy Institute, hypes a terrorst threat I've never seen hyped before....

Baby Terrorists
From Schneier on Security

Baby Terrorists

This, from Congressman Louie Gohmert of Texas, is about as dumb as it gets: I talked to a retired FBI agent who said that one of the things they were looking at...

Third SHB Workshop
From Schneier on Security

Third SHB Workshop

I'm at SHB 2010, the Third Interdisciplinary Workshop on Security and Human Behavior, at Cambridge University. This is a two-day gathering of computer securityprogram...

Friday Squid Blogging: Vampire Squid
From Schneier on Security

Friday Squid Blogging: Vampire Squid

The vampire squid can turn itself inside out to avoid predators.

Hacker Scare Story
From Schneier on Security

Hacker Scare Story

"10 Everyday Items Hackers Are Targeting Right Now" 5. Your Blender. Yes, Your Blender That's right: your blender is under attack! Most mixers are self-contained...

Security Trade-Offs in Crayfish
From Schneier on Security

Security Trade-Offs in Crayfish

Interesting: The experiments offered the crayfish stark decisions -- a choice between finding their next meal and becoming a meal for an apparent predator. In...

TacSat-3 "Hyperspectral" Spy Satellite
From Schneier on Security

TacSat-3 "Hyperspectral" Spy Satellite

It's operational: The idea of hyperspectral sensing is not, however, merely to "see" in the usual sense of optical telescopes, infrared nightscopes and/or thermal...

WikiLeaks
From Schneier on Security

WikiLeaks

Long, but interesting, profile of WikiLeaks's Julian Assange from The New Yorker. Assange is an international trafficker, of sorts. He and his colleagues collect...

Popsicle Makers a Security Threat
From Schneier on Security

Popsicle Makers a Security Threat

Chicago chef Rick Bayless photographed this security sign, posted before airport security as people were returning home from the Aspen Food & Wine Festival: No...

How Much Counterterrorism Can We Afford?
From Schneier on Security

How Much Counterterrorism Can We Afford?

In an article on using terahertz rays (is that different from terahertz radar?) to detect biological agents, we find this quote: "High-tech, low-tech, we can't...

The Real Risk: Traffic Deaths
From Schneier on Security

The Real Risk: Traffic Deaths

The New York Times Room for Debate blog did the topic: "Do We Tolerate Too Many Traffic Deaths?"

Buying an ATM Skimmer
From Schneier on Security

Buying an ATM Skimmer

Interesting: TM skimmers -- or fraud devices that criminals attach to cash machines in a bid to steal and ultimately clone customer bank card data -- are marketed...

Cheating on Tests, by the Teachers
From Schneier on Security

Cheating on Tests, by the Teachers

If you give people enough incentive to cheat, people will cheat: Of all the forms of academic cheating, none may be as startling as educators tampering with children's...

AT&T's iPad Security Breach
From Schneier on Security

AT&T's iPad Security Breach

I didn't write about the recent security breach that disclosed tens of thousands of e-mail addresses and ICC-IDs of iPad users because, well, there was nothingwere...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account