acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorschneier
bg-corner

"The Declining Half-Life of Secrets"
From Schneier on Security

"The Declining Half-Life of Secrets"

Several times I've mentioned Peter Swire's concept of "the declining half-life of secrets." He's finally written it up: The nature of secrets is changing. Secrets...

History of the L0pht
From Schneier on Security

History of the L0pht

This Washington Post article uses the history of the L0pht to talk about the broader issues of Internet security....

What Can you Learn from Metadata?
From Schneier on Security

What Can you Learn from Metadata?

An Australian reporter for the ABC, Will Ockenden published a bunch of his metadata, and asked people to derive various elements of his life. They did pretty well...

Using Samsung's Internet-Enabled Refrigerator for Man-in-the-Middle Attacks
From Schneier on Security

Using Samsung's Internet-Enabled Refrigerator for Man-in-the-Middle Attacks

This is interesting research:: Whilst the fridge implements SSL, it FAILS to validate SSL certificates, thereby enabling man-in-the-middle attacks against most...

Friday Squid Blogging: Cephalopod Anatomy Class
From Schneier on Security

Friday Squid Blogging: Cephalopod Anatomy Class

Beautiful diorama. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Mickens on Security
From Schneier on Security

Mickens on Security

James Mickens, for your amusement. A somewhat random sample: My point is that security people need to get their priorities straight. The "threat model" section...

The Benefits of Endpoint Encryption
From Schneier on Security

The Benefits of Endpoint Encryption

An unofficial blog post from FTC chief technologist Ashkan Soltani on the virtues of strong end-user device controls....

German BfV - NSA Cooperation
From Schneier on Security

German BfV - NSA Cooperation

The German newspaper Zeit is reporting the BfV, Germany's national intelligence agency, (probably) illegally traded data about Germans to the NSA in exchange for...

Iranian Phishing
From Schneier on Security

Iranian Phishing

CitizenLab is reporting on Iranian hacking attempts against activists, which include a real-time man-in-the-middle attack against Google's two-factor authentication...

Defending All the Targets Is Impossible
From Schneier on Security

Defending All the Targets Is Impossible

In the wake of the recent averted mass shooting on the French railroads, officials are realizing that there are just too many potential targets to defend. The sheer...

Regularities in Android Lock Patterns
From Schneier on Security

Regularities in Android Lock Patterns

Interesting: Marte Løge, a 2015 graduate of the Norwegian University of Science and Technology, recently collected and analyzed almost 4,000 ALPs as part of her...

Movie Plot Threat: Terrorists Attacking US Prisons
From Schneier on Security

Movie Plot Threat: Terrorists Attacking US Prisons

Kansas Senator Pat Roberts wins an award for his movie-plot threat: terrorists attacking the maximum-security federal prison at Ft. Leavenworth: In an Aug. 14 letter...

Are Data Breaches Getting Larger?
From Schneier on Security

Are Data Breaches Getting Larger?

This research says that data breaches are not getting larger over time. "Hype and Heavy Tails: A Closer Look at Data Breaches," by Benjamin Edwards, Steven Hofmeyr...

Heartbeat as a Biometric
From Schneier on Security

Heartbeat as a Biometric

Yet another biometric: your heartbeat....

The Advertising Value of Intrusive Tracking
From Schneier on Security

The Advertising Value of Intrusive Tracking

Here's an interesting research paper that tries to calculate the differential value of privacy-invasive advertising practices. The researchers used data from a...

Friday Squid Blogging: Calamari Ripieni Recipe
From Schneier on Security

Friday Squid Blogging: Calamari Ripieni Recipe

Nice and easy Calamari Ripieni recipe, along with general instructions on cooking squid: Tenderizing squid is as simple as pounding it flat -- if you're going to...

NSA Plans for a Post-Quantum World
From Schneier on Security

NSA Plans for a Post-Quantum World

Quantum computing is a novel way to build computers -- one that takes advantage of the quantum properties of particles to perform operations on data in a very different...

SS7 Phone-Switch Flaw Enabled Surveillance
From Schneier on Security

SS7 Phone-Switch Flaw Enabled Surveillance

Interesting: Remember that vulnerability in the SS7 inter-carrier network that lets hackers and spies track your cellphone virtually anywhere in the world? It's...

Snake-Oil Cryptography Competition
From Schneier on Security

Snake-Oil Cryptography Competition

Funny....

No-Fly List Uses Predictive Assessments
From Schneier on Security

No-Fly List Uses Predictive Assessments

The US government has admitted that it uses predictive assessments to put people on the no-fly list: In a little-noticed filing before an Oregon federal judge,...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account