acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

The Limits of Visual Inspection
From Schneier on Security

The Limits of Visual Inspection

Interesting research: Target prevalence powerfully influences visual search behavior. In most visual search experiments, targets appear on at least 50% of trials...

More Details on the Chinese Attack Against Google
From Schneier on Security

More Details on the Chinese Attack Against Google

Three weeks ago, Google announced a sophisticated attack against them from China. There have been some interesting technical details since then. And the NSA is...

New Attack on Threefish
From Schneier on Security

New Attack on Threefish

At FSE 2010 this week, Dmitry Khovratovich and Ivica Nikolic presented a paper where they cryptanalyze ARX algorithms (algorithms that use only addition, rotation...

Friday Squid Blogging: Squid Cookie
From Schneier on Security

Friday Squid Blogging: Squid Cookie

I wonder if it's tasty.

10 Cartoons about Airport Security
From Schneier on Security

10 Cartoons about Airport Security

A slide show.

Scaring the Senate Intelligence Committee
From Schneier on Security

Scaring the Senate Intelligence Committee

This is unconscionable: At Tuesday's hearing, Senator Dianne Feinstein, Democrat of California and chairwoman of the Senate Intelligence Committee, asked Mr. Blair...

World's Largest Data Collector Teams Up With Word's Largest Data Collector
From Schneier on Security

World's Largest Data Collector Teams Up With Word's Largest Data Collector

Does anyone think this is a good idea? Under an agreement that is still being finalized, the National Security Agency would help Google analyze a major corporate...

Security and Function Creep
From Schneier on Security

Security and Function Creep

Security is rarely static. Technology changes both security systems and attackers. But there

Anonymity and the Internet
From Schneier on Security

Anonymity and the Internet

Universal identification is portrayed by some as the holy grail of Internet security. Anonymity is bad, the argument goes; and if we abolish it, we can ensure only...

More Movie Plot Terrorist Threats
From Schneier on Security

More Movie Plot Terrorist Threats

The Foreign Policy website has its own list of movie-plot threats: machine-gun wielding terrorists on paragliders, disease-laden insect swarms, a dirty bomb made...

Online Credit/Debit Card Security Failure
From Schneier on Security

Online Credit/Debit Card Security Failure

Ross Anderson reports: Online transactions with credit cards or debit cards are increasingly verified using the 3D Secure system, which is branded as "Verified...

Friday Squid Blogging: Harrowgate's 1886 Giant Squid
From Schneier on Security

Friday Squid Blogging: Harrowgate's 1886 Giant Squid

I have no idea how to explain this.

Deconfliction
From Schneier on Security

Deconfliction

This is well worth watching.

Tracking Your Browser Without Cookies
From Schneier on Security

Tracking Your Browser Without Cookies

How unique is your browser? Can you be tracked simply by its characteristics? The EFF is trying to find out. Their site Panopticlick will measure the characteristics...

World Privacy Day and the Madrid Privacy Declaration
From Schneier on Security

World Privacy Day and the Madrid Privacy Declaration

Today is World Privacy Day. (I know; it's odd to me, too.) You can celebrate by signing on to the Madrid Privacy Declaration, either as an individual or as an...

Scanning Cargo for Nuclear Material and Conventional Explosives
From Schneier on Security

Scanning Cargo for Nuclear Material and Conventional Explosives

Still experimental: The team propose using a particle accelerator to alternately smash ionised hydrogen molecules and deuterium ions into targets of carbon and...

More Surveillance in the UK
From Schneier on Security

More Surveillance in the UK

This seems like a bad idea: Police in the UK are planning to use unmanned spy drones, controversially deployed in Afghanistan, for the "routine" monitoring of...

Penny Shooter Business Card
From Schneier on Security

Penny Shooter Business Card

Nice. Of course, this means that the TSA will start banning wallets on airplanes.

The Abdulmutallab that Should Have Been Connected
From Schneier on Security

The Abdulmutallab that Should Have Been Connected

The notion that U.S. intelligence should have "connected the dots," and caught Abdulmutallab, isn't going away. This is a typical example: So you'd need comeresponds...

Me on Chinese Hacking and Enabling Surveillance
From Schneier on Security

Me on Chinese Hacking and Enabling Surveillance

CNN.com just published an essay of mine on China's hacking of Google, an update of this essay.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account