acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Attacking Online Poker Players
From Schneier on Security

Attacking Online Poker Players

This story is about how at least two professional online poker players had their hotel rooms broken into and their computers infected with malware. I agree with...

Friday Squid Blogging: Squid Bow Tie
From Schneier on Security

Friday Squid Blogging: Squid Bow Tie

Snappy-looking bow tie. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

President Obama and the Intelligence Community
From Schneier on Security

President Obama and the Intelligence Community

Really good article from the New Yorker.

World War II Anecdote about Trust and Security
From Schneier on Security

World War II Anecdote about Trust and Security

This is an interesting story from World War II about trust: Jones notes that the Germans doubted their system because they knew the British could radio false orders...

How the NSA Tracks Mobile Phone Data
From Schneier on Security

How the NSA Tracks Mobile Phone Data

Last week the Washington Post reported on how the NSA tracks mobile phones world-wide, and this week they followed up with source documents and more detail. Barton...

NSA Tracks People Using Google Cookies
From Schneier on Security

NSA Tracks People Using Google Cookies

The Washington Post has a detailed article on how the NSA uses cookie data to track individuals. The EFF also has a good post on this. I have been writing and...

NSA Spying on Online Gaming Worlds
From Schneier on Security

NSA Spying on Online Gaming Worlds

The NSA is spying on chats in World of Warcraft and other games. There's lots of information -- and a good source document. While it's fun to joke about the NSA...

Bitcoin Explanation
From Schneier on Security

Bitcoin Explanation

This is the best explanation of the Bitcoin protocol that I have read.

Friday Squid Blogging: Hoax Squid-Like Creature
From Schneier on Security

Friday Squid Blogging: Hoax Squid-Like Creature

The weird squid-like creature floating around Bristol Harbour is a hoax. As usual, you can also use this squid post to talk about the security stories in the news...

New Book: <i>Carry On</i>
From Schneier on Security

New Book: Carry On

I have a new book. It's Carry On: Sound Advice from Schneier on Security, and it's my second collection of essays. This book covers my writings from March 2008...

Bruce Schneier Facts T-Shirts
From Schneier on Security

Bruce Schneier Facts T-Shirts

0-Day Clothing has taken 25 Bruce Schneier Facts and turned them into T-shirts just in time for Christmas.

Telepathwords: A New Password Strength Estimator
From Schneier on Security

Telepathwords: A New Password Strength Estimator

Telepathwords is a pretty clever research project that tries to evaluate password strength. It's different from normal strength meters, and I think better. Telepathwords...

Heartwave Biometric
From Schneier on Security

Heartwave Biometric

Here's a new biometric I know nothing about: The wristband relies on authenticating identity by matching the overall shape of the user's heartwave (captured via...

The Problem with EULAs
From Schneier on Security

The Problem with EULAs

Some apps are being distributed with secret Bitcoin-mining software embedded in them. Coins found are sent back to the app owners, of course. And to make it legal...

Evading Airport Security
From Schneier on Security

Evading Airport Security

The news is reporting about Evan Booth, who builds weaponry out of items you can buy after airport security. It's clever stuff. It's not new, though. Peopleexplained...

Keeping Track of All the Snowden Documents
From Schneier on Security

Keeping Track of All the Snowden Documents

As more and more media outlets from all over the world continue to report on the Snowden documents, it's harder and harder to keep track of what has been released...

The TQP Patent
From Schneier on Security

The TQP Patent

One of the things I do is expert witness work in patent litigations. Often, it's defending companies against patent trolls. One of the patents I have worked on...

How Antivirus Companies Handle State-Sponsored Malware
From Schneier on Security

How Antivirus Companies Handle State-Sponsored Malware

Since we learned that the NSA has surreptitiously weakened Internet security so it could more easily eavesdrop, we've been wondering if it's done anything to antivirus...

Friday Squid Blogging: Squid Worm Discovered
From Schneier on Security

Friday Squid Blogging: Squid Worm Discovered

This squid-like worm -- Teuthidodrilus samae -- is new to science. As usual, you can also use this squid post to talk about the security stories in the news that...

More on Stuxnet
From Schneier on Security

More on Stuxnet

Ralph Langer has written the definitive analysis of Stuxnet: short, popular version, and long, technical version. Stuxnet is not really one weapon, but two. The...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account