acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Telcoms Security
From Schneier on Security

Telcoms Security

A very good four-part series: "Risk and Security in the Telecommunications Industry."

The U.S. Civil Rights Movement as an Insurgency
From Schneier on Security

The U.S. Civil Rights Movement as an Insurgency

This is interesting: Most Americans fail to appreciate that the Civil Rights movement was about the overthrow of an entrenched political order in each of the Southern...

U.S./Russia Cyber Arms Control Talks
From Schneier on Security

U.S./Russia Cyber Arms Control Talks

Now this interesting: The United States has begun talks with Russia and a United Nations arms control committee about strengthening Internet security and limiting...

Me Speaking on "The Future of Privacy"
From Schneier on Security

Me Speaking on "The Future of Privacy"

Video of the talk I gave to the Open Right Group last week in London.

Friday Squid Blogging: Cephalopod Christmas Trees
From Schneier on Security

Friday Squid Blogging: Cephalopod Christmas Trees

Christmas is coming.

Yet Another Schneier Interview
From Schneier on Security

Yet Another Schneier Interview

This one from Gulf News.

Wondermark on Passwords
From Schneier on Security

Wondermark on Passwords

Funny.

Obama's Cybersecurity Czar
From Schneier on Security

Obama's Cybersecurity Czar

Rumors are that RSA president Art Coviello declined the job. No surprise: it has no actual authority but a lot of responsibility. Security experts have pointed...

Reacting to Security Vulnerabilities
From Schneier on Security

Reacting to Security Vulnerabilities

Last month, researchers found a security flaw in the SSL protocol, which is used to protect sensitive web data. The protocol is used for online commerce, webmail...

TSA Publishes Standard Operating Procedures
From Schneier on Security

TSA Publishes Standard Operating Procedures

BoingBoing is pretty snarky: The TSA has published a "redacted" version of their s00per s33kr1t screening procedure guidelines (Want to know whether to frisk a...

My Reaction to Eric Schmidt
From Schneier on Security

My Reaction to Eric Schmidt

Schmidt said: I think judgment matters. If you have something that you don't want anyone to know, maybe you shouldn't be doing it in the first place. If you really...

Emotional Epidemiology
From Schneier on Security

Emotional Epidemiology

This, from The New England Journal of Medicine, sounds familiar: This is the story line for most headline-grabbing illnesses

Using Fake Documents to Get a Valid U.S. Passport
From Schneier on Security

Using Fake Documents to Get a Valid U.S. Passport

I missed this story: Since 2007, the U.S. State Department has been issuing high-tech "e-passports," which contain computer chips carrying biometric data to prevent...

Terrorists Targeting High-Profile Events
From Schneier on Security

Terrorists Targeting High-Profile Events

In an AP story on increased security at major football (the American variety) events, this sentence struck me: "High-profile events are something that terrorist...

Friday Squid Blogging: Squid Showerhead
From Schneier on Security

Friday Squid Blogging: Squid Showerhead

Neat.

Sprint Provides U.S. Law Enforcement with Cell Phone Customer Location Data
From Schneier on Security

Sprint Provides U.S. Law Enforcement with Cell Phone Customer Location Data

Wired summarizes research by Christopher Soghoian: Sprint Nextel provided law enforcement agencies with customer location data more than 8 million times between...

The Security Implications of Windows Volume Shadow Copy
From Schneier on Security

The Security Implications of Windows Volume Shadow Copy

It can be impossible to securely delete a file: What are the security implications of Volume Shadow Copy? Suppose you decide to protect one of your documents...

Fingerprinting RFID Chips
From Schneier on Security

Fingerprinting RFID Chips

This research centers on looking at the radio characteristics of individual RFID chips and creating a "fingerprint." It makes sense; fingerprinting individual...

Cyberwarfare Policy
From Schneier on Security

Cyberwarfare Policy

National Journal has an excellent article on cyberwar policy. I agree with the author's comments on The Atlantic blog: Would the United States ever use a morereport...

The Psychology of Being Scammed
From Schneier on Security

The Psychology of Being Scammed

This is a very interesting paper: "The Real Hustle, which does hidden camera demonstrations of con games. (There's no DVD of the show available, but there areprevious...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account