acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

The Effects of Data Breach Litigation
From Schneier on Security

The Effects of Data Breach Litigation

"Empirical Analysis of Data Breach Litigation," Sasha Romanosky, David Hoffman, and Alessandro Acquisti: Abstract: In recent years, a large number of data breaches...

Congressional Testimony on the TSA
From Schneier on Security

Congressional Testimony on the TSA

I was supposed to testify today about the TSA in front of the House Committee on Oversight and Government Reform. I was informally invited a couple of weeks ago...

Rare Spanish Enigma Machine
From Schneier on Security

Rare Spanish Enigma Machine

This is a neat story: A pair of rare Enigma machines used in the Spanish Civil War have been given to the head of GCHQ, Britain's communications intelligence agency...

Friday Squid Blogging: Giant Squid Eyes
From Schneier on Security

Friday Squid Blogging: Giant Squid Eyes

It seems that the huge eyes of the giant squid are optimized to see sperm whales.

<i>The Economist</i> Debate on Airplane Security
From Schneier on Security

The Economist Debate on Airplane Security

On The Economist website, I am currently debating Kip Hawley on airplane security. On Tuesday we posted our initial statements, and today (London time) we posted...

Can the NSA Break AES?
From Schneier on Security

Can the NSA Break AES?

In an excellent article in Wired, James Bamford talks about the NSA's codebreaking capability. According to another top official also involved with the program...

Another <i>Liars and Outliers</i> Excerpt
From Schneier on Security

Another Liars and Outliers Excerpt

IT World published an excerpt from Chapter 4.

Unprinter
From Schneier on Security

Unprinter

A way to securely erase paper: "The key idea was to find a laser energy level that is high enough to ablate - or vaporise - the toner that at the same time isNew...

Hacking Critical Infrastructure
From Schneier on Security

Hacking Critical Infrastructure

A otherwise uninteresting article on Internet threats to public infrastructure contains this paragraph: At a closed-door briefing, the senators were shown howtake...

Avi Rubin on Computer Security
From Schneier on Security

Avi Rubin on Computer Security

Avi Rubin has a TEDx talk on hacking various computer devices: medical devices, automobiles, police radios, smart phones, etc.

Australian Security Theater
From Schneier on Security

Australian Security Theater

I like the quote at the end of this excerpt: Aviation officials have questioned the need for such a strong permanent police presence at airports, suggesting they...

Friday Squid Blogging: Squid-Shaped USB Drive
From Schneier on Security

Friday Squid Blogging: Squid-Shaped USB Drive

It looks great. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

BitCoin Security Musings
From Schneier on Security

BitCoin Security Musings

Jon Callas talks about BitCoin's security model, and how susceptible it would be to a Goldfinger-style attack (destroy everyone else's BitCoins).

Non-Lethal Heat Ray
From Schneier on Security

Non-Lethal Heat Ray

The U.S. military has a non-lethal heat ray. No details on what "non-lethal" means in this context.

Assorted Schneier News Stories
From Schneier on Security

Assorted Schneier News Stories

I have several stories in the news (and one podcast), mostly surrounding the talks I gave at the RSA Conference last month.

More "Liars and Outliers" Links
From Schneier on Security

More "Liars and Outliers" Links

First, five new reviews of the book. Second, four new AV interviews about the book. Third, I take the Page 99 Test.

On Cyberwar Hype
From Schneier on Security

On Cyberwar Hype

Good article by Thomas Rid on the hype surrounding cyberwar. It's well worth reading. And in a more academic paper, published in the RUSI Journal, Thomas Ridgeneric...

A Negative <i>Liars and Outliers</i> Review
From Schneier on Security

A Negative Liars and Outliers Review

Ths person didn't like it at all. It'll go up on the book's webpage, along with all the positive reviews.

The Security of Multi-Word Passphrases
From Schneier on Security

The Security of Multi-Word Passphrases

Interesting research on the security of passphrases. From a blog post on the work: We found about 8,000 phrases using a 20,000 phrase dictionary. Using a very...

Video Shows TSA Full-Body Scanner Failure
From Schneier on Security

Video Shows TSA Full-Body Scanner Failure

The Internet is buzzing about this video, showing a blogger walking through two different types of full-body scanners with metal objects. Basically, by placing...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account