acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Back Door in Battery Charger
From Schneier on Security

Back Door in Battery Charger

Amazing: The United States Computer Emergency Response Team (US-CERT) has warned that the software included in the Energizer DUO USB battery charger contains a...

PDF the Most Common Malware Vector
From Schneier on Security

PDF the Most Common Malware Vector

MS Word has been dethroned: Files based on Reader were exploited in almost 49 per cent of the targeted attacks of 2009, compared with about 39 per cent that took...

Even More on the al-Mabhouh Assassination
From Schneier on Security

Even More on the al-Mabhouh Assassination

This, from a former CIA chief of station: The point is that in this day and time, with ubiquitous surveillance cameras, the ability to comprehensively analysearticle...

Friday Squid Blogging: Preserving Your Giant Squid
From Schneier on Security

Friday Squid Blogging: Preserving Your Giant Squid

Plastination: For several years von Hagens and his team experimented using smaller squid, and found that the fragility of the skin needed a slower replacement...

Bringing Lots of Liquids on a Plane at Schiphol
From Schneier on Security

Bringing Lots of Liquids on a Plane at Schiphol

This would worry me, if the liquid ban weren't already useless. The reporter found the security flaw in the airport's duty-free shopping system. At Schiphol airport...

Security Trade-Offs and Sacred Values
From Schneier on Security

Security Trade-Offs and Sacred Values

Interesting research: Psychologist Jeremy Ginges and his colleagues identified this backfire effect in studies of the Israeli-Palestinian conflict in 2007. They...

Disabling Cars by Remote Control
From Schneier on Security

Disabling Cars by Remote Control

Who didn't see this coming? More than 100 drivers in Austin, Texas found their cars disabled or the horns honking out of control, after an intruder ran amok in...

Casino Hack
From Schneier on Security

Casino Hack

Nice http://www.casinocitytimes.com/news/article/computer-experts-stole-

Secret Questions
From Schneier on Security

Secret Questions

Interesting research: Analysing our data for security, though, shows that essentially all human-generated names provide poor resistance to guessing. For an attacker...

USB Combination Lock
From Schneier on Security

USB Combination Lock

Here's a promotional security product designed by someone who knows nothing about security. The USB drive is "protected" by a combination lock. There are only...

Typosquatting
From Schneier on Security

Typosquatting

"Measuring the Perpetrators and Funders of Typosquatting," by Tyler Moore and Benjamin Edelman: Abstract. We describe a method for identifying "typosquatting",...

Friday Squid Blogging: Cipherlopods
From Schneier on Security

Friday Squid Blogging: Cipherlopods

This makes no sense to me, even though -- I suppose -- it's a squid cryptography joke.

Another Schneier Interview
From Schneier on Security

Another Schneier Interview

This one on simple-talk.com.

Why DRM Doesn't Work
From Schneier on Security

Why DRM Doesn't Work

Funny comic.

More Hollow Coins
From Schneier on Security

More Hollow Coins

A hollowed-out U.S. nickel can hold a microSD card. Pound and euro coins are also available. I blogged about this about a year ago as well.

Wikibooks Cryptography Textbook
From Schneier on Security

Wikibooks Cryptography Textbook

Over at Wikibooks, they're trying to write an open source cryptography textbook.

Wanted: Trust Detector
From Schneier on Security

Wanted: Trust Detector

It's good to dream: IARPA's five-year plan aims to design experiments that can measure trust with high certainty -- a tricky proposition for a psychological study...

Nose Biometrics
From Schneier on Security

Nose Biometrics

Really: Since they are hard to conceal, the study says, noses would work well for identification in covert surveillance. The researchers say noses have been overlooked...

The Limits of Identity Cards
From Schneier on Security

The Limits of Identity Cards

Good legal paper on the limits of identity cards: Stephen Mason and Nick Bohm, "Identity and its Verification," in Computer Law & Security Review, Volume 26, Number...

Marc Rotenberg on Google's Italian Privacy Case
From Schneier on Security

Marc Rotenberg on Google's Italian Privacy Case

Interesting commentary: I don't think this is really a case about ISP liability at all. It is a case about the use of a person's image, without their consent,...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account