acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Users Rationally Rejecting Security Advice
From Schneier on Security

Users Rationally Rejecting Security Advice

This paper, by Cormac Herley at Microsoft Research, sounds like me: Abstract: It is often suggested that users are hopelessly lazy and unmotivated on securityme...

Norbt
From Schneier on Security

Norbt

Norbt (no robot) is a low-security web application to encrypt web pages. You can create and encrypt a webpage. The key is an answer to a question; anyone who...

Decertifying "Terrorist" Pilots
From Schneier on Security

Decertifying "Terrorist" Pilots

This article reads like something written by the company's PR team. When it comes to sleuthing these days, knowing your way within a database is as valued a skill...

Al Qaeda Secret Code Broken
From Schneier on Security

Al Qaeda Secret Code Broken

I would sure like to know more about this: Top code-breakers at the Government Communications Headquarters in the United Kingdom have succeeded in breaking the...

Friday Squid Blogging: New Squid Discovered
From Schneier on Security

Friday Squid Blogging: New Squid Discovered

An expedition to study seamounts in the Indian Ocean has discovered some new species, including some squid.

FailBlog on Security
From Schneier on Security

FailBlog on Security

Funny: career fair fail.

Interview with Me
From Schneier on Security

Interview with Me

Yet another interview with me. This one is audio, and was conducted in Rotterdam in October.  

Denial-of-Service Attack Against CALEA
From Schneier on Security

Denial-of-Service Attack Against CALEA

Interesting: The researchers say they've found a vulnerability in U.S. law enforcement wiretaps, if only theoretical, that would allow a surveillance target to...

A Taxonomy of Social Networking Data
From Schneier on Security

A Taxonomy of Social Networking Data

At the Internet Governance Forum in Sharm El Sheikh this week, there was a conversation on social networking data. Someone made the point that there are several...

Stabbing People with Stuff You Can Get Through Airport Security
From Schneier on Security

Stabbing People with Stuff You Can Get Through Airport Security

"Use of a pig model to demonstrate vulnerability of major neck vessels to inflicted trauma from common household items," from the American Journal of Forensic Medical...

How Smart are Islamic Terrorists?
From Schneier on Security

How Smart are Islamic Terrorists?

Organizational Learning and Islamic Militancy (May 2009) was written by Michael Kenney for the U.S. Department of Justice. It's long: 146 pages. From the executive...

Quantum Ghost Imaging
From Schneier on Security

Quantum Ghost Imaging

This is cool: Ghost imaging is a technique that allows a high-resolution camera to produce an image of an object that the camera itself cannot see. It uses two...

Secret Knock Lock
From Schneier on Security

Secret Knock Lock

Door lock that opens if you tap a particular rhythm.  

A Useful Side-Effect of Misplaced Fear
From Schneier on Security

A Useful Side-Effect of Misplaced Fear

A study in the British Journal of Criminology makes the point that drink-spiking date-raping is basically an urban legend: Abstract. There is a stark contrast...

Anti-Malware Detection and the Original Trojan Horse
From Schneier on Security

Anti-Malware Detection and the Original Trojan Horse

Funny.

Public Reactions to Terrorist Threats
From Schneier on Security

Public Reactions to Terrorist Threats

Interesting research: For the last five years we have researched the connection between times of terrorist threats and public opinion. In a series of tightly designed...

Bruce Schneier Action Figure
From Schneier on Security

Bruce Schneier Action Figure

A month ago, ThatsMyFace.com approached me about making a Bruce Schneier action figure. It's $100. I'd like to be able to say something like "half the proceeds...

Friday Squid Blogging: Sperm Whale Eating Giant Squid
From Schneier on Security

Friday Squid Blogging: Sperm Whale Eating Giant Squid

Rare photo.

Blowfish in Fiction
From Schneier on Security

Blowfish in Fiction

The algorithm is mentioned in Von Neumann's War, by John Ringo and Travis Taylor. P. 495: The guy was using a fairly simple buffer overflow attack but withEvery...

Video Interview with Me
From Schneier on Security

Video Interview with Me

Here's an interview with me, conducted at the Information Security Decisions conference in Chicago in October.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account