acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Another Debit Card Skimmer
From Schneier on Security

Another Debit Card Skimmer

This one is installed inside gas pumps. There's nothing the customer can detect.

Friday Squid Blogging: Squid Socks
From Schneier on Security

Friday Squid Blogging: Squid Socks

Cute, but not really for me.

Cyber Shockwave Test
From Schneier on Security

Cyber Shockwave Test

There was a big U.S. cyberattack exercise this week. We didn't do a This is, I think, an eyewitness report.

Al-Mabhouh Assassination
From Schneier on Security

Al-Mabhouh Assassination

It reads like a very professional operation: Security footage of the killers' movements during the afternoon, released by police in Dubai yesterday, underlines...

Opening Locks with Foil Impressioning
From Schneier on Security

Opening Locks with Foil Impressioning

Interesting blog post, with video demonstration, about an improved tool to open high security locks with a key that will just "form itself" if you insert it into...

Bruce Schneier Facebook Page
From Schneier on Security

Bruce Schneier Facebook Page

I finally have control of my Facebook page. There'll be nothing on it that isn't on my blog, but some of you might prefer following my writing from there. (ITwitter...

Botnets Attacking Each Other
From Schneier on Security

Botnets Attacking Each Other

A new Trojan Horse named Spy Eye has code that kills Zeus, a rival botnet.  

Detecting Cheating by Analyzing Erased Answers
From Schneier on Security

Detecting Cheating by Analyzing Erased Answers

I had no idea this was being done, but erased answers are now analyzed on standardized tests. Schools with a high number of wrong-to-right changes across multiple...

James Fallows on the Chinese Cyber Threat
From Schneier on Security

James Fallows on the Chinese Cyber Threat

Interesting. I wrote this about Chinese cyberattacks in 2008.

Radio Interview
From Schneier on Security

Radio Interview

I was interviewed on the New Horizons radio show in Boise.

Friday Squid Blogging: Squid Record
From Schneier on Security

Friday Squid Blogging: Squid Record

I don't know which is more exciting: that someone is trying to break the squid record, or that there is a squid record in the first place. An Auckland scientist...

Crypto Comic Book
From Schneier on Security

Crypto Comic Book

I have no idea.

Homebrew Cryptography
From Schneier on Security

Homebrew Cryptography

Nice article about a would-be spy and his homebrew pencil-and-paper cryptography.

Car-Key Copier
From Schneier on Security

Car-Key Copier

This< is neat: The Impressioner consists of a sensor that goes into the lock and sends information back to a computer via USB about the location of the lock's...

Man-in-the-Middle Attack Against Chip and PIN
From Schneier on Security

Man-in-the-Middle Attack Against Chip and PIN

Nice attack against the EMV -- Eurocard Mastercard Visa -- the "chip and PIN" credit card payment system. The attack allows a criminal to use a stolen card without...

Interview with a Nigerian Internet Scammer
From Schneier on Security

Interview with a Nigerian Internet Scammer

Really interesting reading. Scam-Detective: How did you find victims for your scams? John: First you need to understand how the gangs work. At the bottom are...

Terrorists Prohibited from Using iTunes
From Schneier on Security

Terrorists Prohibited from Using iTunes

The iTunes Store Terms and Conditions prohibits it: Notice, as I read this clause not only are terrorists -- or at least those on terrorist watch lists -- prohibited...

Dahlia Lithwick on Terrorism Derangement Syndrome
From Schneier on Security

Dahlia Lithwick on Terrorism Derangement Syndrome

In Slate.

All Subversive Organizations Now Must Register in South Carolina
From Schneier on Security

All Subversive Organizations Now Must Register in South Carolina

This appears not to be a joke: The state's "Subversive Activities Registration Act," passed last year and now officially on the books, states that "every member...

Outguessing the Terrorists
From Schneier on Security

Outguessing the Terrorists

Isn't it a bit embarrassing for an "expert on counter-terrorism" to be quoted as saying this? Bill Tupman, an expert on counter-terrorism from Exeter University...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account