acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Attacking U.S. Critical Infrastructure
From Schneier on Security

Attacking U.S. Critical Infrastructure

Squirrel terrorists. We have a cognitive bias to exaggerate risks caused by other humans, and downplay risks caused by animals (and, even more, by natural phenomena...

Report on Chinese Cyberwarfare Capability
From Schneier on Security

Report on Chinese Cyberwarfare Capability

"Capability of the People's Republic of China to Conduct Cyber Warfare and Computer Network Exploitation," prepared for the US-China Economic and Security Review...

DDNI for Collection Press Conference
From Schneier on Security

DDNI for Collection Press Conference

The U.S. Deputy Director of National Intelligence for Collection gives a press conference on the new Utah data collection facility: video and transcript.

A Critical Essay on the TSA
From Schneier on Security

A Critical Essay on the TSA

A critical essay on the TSA from a former assistant police chief: This is where I find myself now obsessing over TSA policy, or its apparent lack. Every one of...

Best Buy Sells Surveillance Tracker
From Schneier on Security

Best Buy Sells Surveillance Tracker

Only $99.99: Keep tabs on your child at all times with this small but sophisticated device that combines GPS and cellular technology to provide you with real-time...

Psychology and Security Resource Page
From Schneier on Security

Psychology and Security Resource Page

Ross Anderson has put together a great resource page on security and psychology: At a deeper level, the psychology of security touches on fundamental scientific...

2006 Wal-Mart Hack
From Schneier on Security

2006 Wal-Mart Hack

Interesting story of a 2006 Wal-Mart hack from, probably, Minsk.

CIA Invests in Social-Network Datamining
From Schneier on Security

CIA Invests in Social-Network Datamining

From Wired: In-Q-Tel, the investment arm of the CIA and the wider intelligence community, is putting cash into Visible Technologies, a software firm that specializes...

Friday Squid Blogging: Steampunk Squid Cake
From Schneier on Security

Friday Squid Blogging: Steampunk Squid Cake

Impressive.

Friday Squid Blogging: Draw-a-Squid Contest
From Schneier on Security

Friday Squid Blogging: Draw-a-Squid Contest

Draw a squid, win Jeff Vandermeer`s Ambergris novels.

"Evil Maid" Attacks on Encrypted Hard Drives
From Schneier on Security

"Evil Maid" Attacks on Encrypted Hard Drives

Earlier this month, Joanna Rutkowska implemented the "evil maid" attack against TrueCrypt. The same kind of attack should work against any whole-disk encryption...

James Bamford on the NSA
From Schneier on Security

James Bamford on the NSA

James Bamford -- author of The Shadow Factory: The NSA from 9/11 to the Eavesdropping on America writes about the NSA's new data center in Utah as he reviews another...

Ballmer Blames the Failure of Windows Vista on Security
From Schneier on Security

Ballmer Blames the Failure of Windows Vista on Security

According to the Telegraph: Mr Ballmer said: "We got some uneven reception when [Vista] first launched in large part because we made some design decisions to improve...

Australia Man Receives Reduced Sentence Due to Encryption
From Schneier on Security

Australia Man Receives Reduced Sentence Due to Encryption

From the Courier-Mail: A man who established a sophisticated network of peepholes and cameras to spy on his flatmates has escaped a jail sentence after police...

TSA Successfully Defends Itself
From Schneier on Security

TSA Successfully Defends Itself

Story here. Basically, a woman posts a horrible story of how she was mistreated by the TSA, and the TSA responds by releasing the video showing that she was lying...

Computer Card Counter Detects Human Card Counters
From Schneier on Security

Computer Card Counter Detects Human Card Counters

All it takes is a computer that can track every card: The anti-card-counter system uses cameras to watch players and keep track of the actual "count" of the cards...

Six Years of Patch Tuesdays
From Schneier on Security

Six Years of Patch Tuesdays

Nice article summing up six years of Microsoft Patch Tuesdays: The total number of flaws disclosed and patched by the software maker so far this year stands at...

Helpful Hint for Fugitives: Don't Update Your Location on Facebook
From Schneier on Security

Helpful Hint for Fugitives: Don't Update Your Location on Facebook

"Fugitive caught after updating his status on Facebook." It's easy to say "so dumb," and it would be true, but what's interesting is how people just don't think...

Friday Squid Blogging: Squid Robot
From Schneier on Security

Friday Squid Blogging: Squid Robot

Cool. It's from this page.

The Commercial Speech Arms Race
From Schneier on Security

The Commercial Speech Arms Race

A few years ago, a company began to sell a liquid with identification codes suspended in it. The idea was that you would paint it on your stuff as proof of ownership...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account