acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Security Trade-Offs and Sacred Values
From Schneier on Security

Security Trade-Offs and Sacred Values

Interesting research: Psychologist Jeremy Ginges and his colleagues identified this backfire effect in studies of the Israeli-Palestinian conflict in 2007. They...

Disabling Cars by Remote Control
From Schneier on Security

Disabling Cars by Remote Control

Who didn't see this coming? More than 100 drivers in Austin, Texas found their cars disabled or the horns honking out of control, after an intruder ran amok in...

Casino Hack
From Schneier on Security

Casino Hack

Nice http://www.casinocitytimes.com/news/article/computer-experts-stole-

Secret Questions
From Schneier on Security

Secret Questions

Interesting research: Analysing our data for security, though, shows that essentially all human-generated names provide poor resistance to guessing. For an attacker...

USB Combination Lock
From Schneier on Security

USB Combination Lock

Here's a promotional security product designed by someone who knows nothing about security. The USB drive is "protected" by a combination lock. There are only...

Typosquatting
From Schneier on Security

Typosquatting

"Measuring the Perpetrators and Funders of Typosquatting," by Tyler Moore and Benjamin Edelman: Abstract. We describe a method for identifying "typosquatting",...

Friday Squid Blogging: Cipherlopods
From Schneier on Security

Friday Squid Blogging: Cipherlopods

This makes no sense to me, even though -- I suppose -- it's a squid cryptography joke.

Another Schneier Interview
From Schneier on Security

Another Schneier Interview

This one on simple-talk.com.

Why DRM Doesn't Work
From Schneier on Security

Why DRM Doesn't Work

Funny comic.

More Hollow Coins
From Schneier on Security

More Hollow Coins

A hollowed-out U.S. nickel can hold a microSD card. Pound and euro coins are also available. I blogged about this about a year ago as well.

Wikibooks Cryptography Textbook
From Schneier on Security

Wikibooks Cryptography Textbook

Over at Wikibooks, they're trying to write an open source cryptography textbook.

Wanted: Trust Detector
From Schneier on Security

Wanted: Trust Detector

It's good to dream: IARPA's five-year plan aims to design experiments that can measure trust with high certainty -- a tricky proposition for a psychological study...

Nose Biometrics
From Schneier on Security

Nose Biometrics

Really: Since they are hard to conceal, the study says, noses would work well for identification in covert surveillance. The researchers say noses have been overlooked...

The Limits of Identity Cards
From Schneier on Security

The Limits of Identity Cards

Good legal paper on the limits of identity cards: Stephen Mason and Nick Bohm, "Identity and its Verification," in Computer Law & Security Review, Volume 26, Number...

Marc Rotenberg on Google's Italian Privacy Case
From Schneier on Security

Marc Rotenberg on Google's Italian Privacy Case

Interesting commentary: I don't think this is really a case about ISP liability at all. It is a case about the use of a person's image, without their consent,...

Guide to Microsoft Police Forensic Services
From Schneier on Security

Guide to Microsoft Police Forensic Services

The "Microsoft Online Services Global Criminal Compliance Handbook (U.S. Domestic Version)" (also can be found here, here, and here) outlines exactly what Microsoft...

Google in <i>The Onion</i>
From Schneier on Security

Google in The Onion

Funny: MOUNTAIN VIEW, CA

Eating a Flash Drive
From Schneier on Security

Eating a Flash Drive

How not to destroy evidence: In a bold and bizarre attempt to destroy evidence seized during a federal raid, a New York City man grabbed a flash drive and swallowed...

De-Anonymizing Social Network Users
From Schneier on Security

De-Anonymizing Social Network Users

Interesting paper: "A Practical Attack to De-Anonymize Social Network Users." Abstract. Social networking sites such as Facebook, LinkedIn, and Xing have been...

Friday Squid Blogging: Squid Teapot
From Schneier on Security

Friday Squid Blogging: Squid Teapot

Squid teapot. Could be squiddier.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account