acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorschneier
bg-corner

Transparency and Accountability
From Schneier on Security

Transparency and Accountability

As part of the fallout of the Boston bombings, we're probably going to get some new laws that give the FBI additional investigative powers. As with the Patriotmost...

2007 NSA Manual on Internet Hacking
From Schneier on Security

2007 NSA Manual on Internet Hacking

Mildly interesting.

Friday Squid Blogging: Squid Festival in Monterey
From Schneier on Security

Friday Squid Blogging: Squid Festival in Monterey

It's at the end of May. Note that it's being put on by the Calamari Entertainment Group. As usual, you can also use this squid post to talk about the security...

The <i>Onion</i> on Browser Security
From Schneier on Security

The Onion on Browser Security

Wise advice: At Chase Bank, we recognize the value of online banking­ -- it’s quick, convenient, and available any time you need it. Unfortunately, though, the...

Mail Cover
From Schneier on Security

Mail Cover

From a FOIAed Department of Transportation document on investigative techniques: A "mail cover" is the process by which the U.S. Postal Service records any data...

The <i>Economist</i> on Guantanamo
From Schneier on Security

The Economist on Guantanamo

Maybe the tide is turning: America is in a hole. The last response of the blowhards and cowards who have put it there is always: "So what would you do: set them...

Reidentifying Anonymous Data
From Schneier on Security

Reidentifying Anonymous Data

Latanya Sweeney has demonstrated how easy it can be to identify people from their birth date, gender, and zip code. The anonymous data she reidentified happened...

Evacuation Alerts at the Airport
From Schneier on Security

Evacuation Alerts at the Airport

Last week, an employee error caused the monitors at LAX to display a building evacuation order: At a little before 9:47 p.m., the message read: "An emergency has...

Is the U.S. Government Recording and Saving All Domestic Telephone Calls?
From Schneier on Security

Is the U.S. Government Recording and Saving All Domestic Telephone Calls?

I have no idea if "former counterterrorism agent for the FBI" Tom Clemente knows what he's talking about, but that's certainly what he implies here: More recently...

Intelligence Analysis and the Connect-the-Dots Metaphor
From Schneier on Security

Intelligence Analysis and the Connect-the-Dots Metaphor

The FBI and the CIA are being criticized for not keeping better track of Tamerlan Tsarnaev in the months before the Boston Marathon bombings. How could they have...

Michael Chertoff on Google Glass
From Schneier on Security

Michael Chertoff on Google Glass

Interesting op-ed by former DHS head Michael Chertoff on the privacy risks of Google Glass. Now imagine that millions of Americans walk around each day wearing...

Honeywords
From Schneier on Security

Honeywords

Here is a simple but clever idea. Seed password files with dummy entries that will trigger an alarm when used. That way a site can know when a hacker is trying...

Friday Squid Blogging: Squid Escape Artist
From Schneier on Security

Friday Squid Blogging: Squid Escape Artist

It's amazing how small a hole he can fit through. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered...

Another WWII Message Decoded
From Schneier on Security

Another WWII Message Decoded

It's a really interesting code and story. (The first link has the most detailed information about the code and the cryptanalysis.)

The Public/Private Surveillance Partnership
From Schneier on Security

The Public/Private Surveillance Partnership

Our government collects a lot of information about us. Tax records, legal records, license records, records of government services received-- it's all in databases...

Risks of Networked Systems
From Schneier on Security

Risks of Networked Systems

Interesting research: Helbing's publication illustrates how cascade effects and complex dynamics amplify the vulnerability of networked systems. For example, just...

More on FinSpy/FinFisher
From Schneier on Security

More on FinSpy/FinFisher

FinFisher (also called FinSpy) is a commercially sold spyware package that is used by governments world-wide, including the U.S. There's a new report that hasbunch...

Google Pays $31,000 for Three Chrome Vulnerabilities
From Schneier on Security

Google Pays $31,000 for Three Chrome Vulnerabilities

Google is paying bug bounties. This is important; there's a market in vulnerabilities that provides incentives for their being kept secret and exploitable; for...

Details of a Cyberheist
From Schneier on Security

Details of a Cyberheist

Really interesting article detailing how criminals steal from a company's accounts over the Internet. The costly cyberheist was carried out with the help of nearly...

The Importance of Backups
From Schneier on Security

The Importance of Backups

I've already written about the guy who got a new trial because a virus ate his court records. Here's someone who will have to redo his thesis research because...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account