acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Applications Disclosing Required Authority
From Schneier on Security

Applications Disclosing Required Authority

This is an interesting piece of research evaluating different user interface designs by which applications disclose to users what sort of authority they need to...

Automobile Security Analysis
From Schneier on Security

Automobile Security Analysis

"Experimental Security Analysis of a Modern Automobile," by a whole mess of authors: Abstract: Modern automobiles are no longer mere mechanical devices; they are...

Detecting Browser History
From Schneier on Security

Detecting Browser History

Interesting research. Main results: [...] We analyzed the results from over a quarter of a million people who ran our tests in the last few months, and found...

Militarized Marine Mammals
From Schneier on Security

Militarized Marine Mammals

Dolphine and sea lions: A Navy seal - actually a sea lion - took less than a minute to find a fake mine under a pier near San Francisco's AT&T Park. A dolphin...

History of NSA Computers
From Schneier on Security

History of NSA Computers

A recently declassified history through 1964.

Outsourcing to an Indian Jail
From Schneier on Security

Outsourcing to an Indian Jail

This doesn't seem like the best idea: Authorities in the southern Indian state of Andhra Pradesh are planning to set up an outsourcing unit in a jail. The unit...

Insect-Based Terrorism
From Schneier on Security

Insect-Based Terrorism

Sounds like fearmongering to me. How real is the threat? Many of the world's most dangerous pathogens already are transmitted by arthropods, the animal phylum...

Software Liabilities in the UK
From Schneier on Security

Software Liabilities in the UK

The British High Court ruled that a software vendor's EULA -- which denied all liability for poor software -- was not reasonable. I wrote about software liabilities...

Friday Squid Blogging: Squid T-Shirts
From Schneier on Security

Friday Squid Blogging: Squid T-Shirts

Some nice ones (ignore the dinosaurs).

I Won a CSO Compass Award
From Schneier on Security

I Won a CSO Compass Award

And CSO published a Q&A with me.

New Windows Attack
From Schneier on Security

New Windows Attack

It's still only in the lab, but nothing detects it right now: The attack is a clever "bait-and-switch" style move. Harmless code is passed to the security software...

Fifth Annual Movie-Plot Threat Contest Semi-Finalists
From Schneier on Security

Fifth Annual Movie-Plot Threat Contest Semi-Finalists

On April 1, I announced the Fifth Annual Movie Plot Threat Contest: Your task, ye Weavers of Tales, is to create a fable of fairytale suitable for instilling the...

Worst-Case Thinking
From Schneier on Security

Worst-Case Thinking

At a security conference recently, the moderator asked the panel of distinguished cybersecurity leaders what their nightmare scenario was. The answers were the...

"If You See Something, Say Something"
From Schneier on Security

"If You See Something, Say Something"

That slogan is owned by New York's Metropolitan Transit Authority (the MTA). Since obtaining the trademark in 2007, the authority has granted permission to use...

Biometric Wallet
From Schneier on Security

Biometric Wallet

Cool idea, or dumb idea? Its features include: Fingerprint access only Bluetooth enabled for notification alerts

Reflections of a Former U-2 Pilot
From Schneier on Security

Reflections of a Former U-2 Pilot

Interesting.

SnapScouts
From Schneier on Security

SnapScouts

I sure hope this is a parody: SnapScouts Keep America Safe! Want to earn tons of cool badges and prizes while competing with you friends to see who can be the...

9/11 Made us Safer?
From Schneier on Security

9/11 Made us Safer?

There's an essay on the Computerworld website that claims I implied, and believe, so: OK, so strictly-speaking, he doesn't use those exact words, but the implication...

Friday Squid Blogging: The Colossal Squid isn't a Vicious Predator
From Schneier on Security

Friday Squid Blogging: The Colossal Squid isn't a Vicious Predator

New research shows that, even though it's 15 meters long, it's not the kraken of myth: Its large size and predatory nature fuelled the ancient myth of the underwater...

I Was Named as One of the Top 10 Science and Technology Writers
From Schneier on Security

I Was Named as One of the Top 10 Science and Technology Writers

Someone named me as one of the top 10 science and technology writers of all time. Flattering though it is, I don't think I belong in the company of Einstein, Newton...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account