acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorschneier
bg-corner

Automobile Data Surveillance and the Future of Black Boxes
From Schneier on Security

Automobile Data Surveillance and the Future of Black Boxes

Tesla Motors gave one of its electric cars to John Broder, a very outspoken electric-car skeptic from the New York Times, for a test drive. After a negative review...

Friday Squid Blogging: More on Flying Squid
From Schneier on Security

Friday Squid Blogging: More on Flying Squid

Japanese squid researchers have confirmed flying squid can fly, and how they do it. (Note: I have written about flying squid before.) As usual, you can also use...

Jacob Appelbaum's 29C3 Keynote Speech
From Schneier on Security

Jacob Appelbaum's 29C3 Keynote Speech

This speech from last December's 29C3 (29th Chaos Communication Congress) is worth listening to. He talks about what we can do in the face of oppressive power...

Guessing Smart Phone PINs by Monitoring the Accelerometer
From Schneier on Security

Guessing Smart Phone PINs by Monitoring the Accelerometer

"Practicality of Accelerometer Side Channels on Smartphones," by Adam J. Aviv. Benjamin Sapp, Matt Blaze, and Jonathan M. Smith. Abstract: Modern smartphonesArticle...

Using the iWatch for Authentication
From Schneier on Security

Using the iWatch for Authentication

Usability engineer Bruce Tognazzini talks about how an iWatch -- which seems to be either a mythical Apple product or one actually in development -- can make authentication...

Anti-Cheating Security in Casinos
From Schneier on Security

Anti-Cheating Security in Casinos

Long article. With over a thousand cameras operating 24/7, the monitoring room creates tremendous amounts of data every day, most of which goes unseen. Six technicians...

Real-World Prisoner's Dilemma from France
From Schneier on Security

Real-World Prisoner's Dilemma from France

This is a real story of a pair of identical twins who are suspected in a crime. There is there is CCTV and DNA evidence that could implicate either suspect. Detailed...

New al Qaeda Encryption Tool
From Schneier on Security

New al Qaeda Encryption Tool

There's not a lot of information -- and quite a lot of hyperbole -- in this article: With the release of the Asrar Al Dardashah plugin, GIMF promised "secure correspondence"...

Massive Police Shootout in Cleveland Despite Lack of Criminals
From Schneier on Security

Massive Police Shootout in Cleveland Despite Lack of Criminals

This is an amazing story. I urge you to read the whole thing, but here's the basics: A November car chase ended in a "full blown-out" firefight, with glass and...

Our New Regimes of Trust
From Schneier on Security

Our New Regimes of Trust

Society runs on trust. Over the millennia, we've developed a variety of mechanisms to induce trustworthy behavior in society. These range from a sense of guiltThis...

Really Clever TLS Attack
From Schneier on Security

Really Clever TLS Attack

This is an extremely clever man-in-the-middle timing attack against AES that exploits the interaction between how the protocol implements AES in CBC mode for encryption...

Platform Fragmentation as a Security Issue
From Schneier on Security

Platform Fragmentation as a Security Issue

Interesting article about the difficulty Google has pushing security updates onto Android phones. The problem is that the phone manufacturer is in charge, and...

Friday Squid Blogging: Squid Recipe
From Schneier on Security

Friday Squid Blogging: Squid Recipe

Chorizo-stuffed squid with potatoes, capers and sage. As usual, you can also use this squid post to talk about the security stories in the news that I haven't...

I Seem to Be a Physical Security Expert Now
From Schneier on Security

I Seem to Be a Physical Security Expert Now

This seems so obviously written by someone who Googled me on the Internet, without any other knowledge of who I am or what i do.

Millennials and Cybersecurity
From Schneier on Security

Millennials and Cybersecurity

This long report looks at risky online behavior among the Millennial generation, and finds that they respond positively to automatic reminders and prodding. No...

Inauguration Security
From Schneier on Security

Inauguration Security

A first-person account of the security surrounding the second inauguration of President Obama.

Tide Becomes Drug Currency
From Schneier on Security

Tide Becomes Drug Currency

Basically, Tide detergent is a popular product with a very small profit margin. So small non-chain grocery and convenience stores are happy to buy it cheaply,started...

Over $3M in Prizes to Hack Google Chrome
From Schneier on Security

Over $3M in Prizes to Hack Google Chrome

Google's contest at the CanSecWest conference: Today we’re announcing our third Pwnium competition­Pwnium 3. Google Chrome is already featured in the Pwn2Own competition...

Why Is Quantum Computing So Hard?
From Schneier on Security

Why Is Quantum Computing So Hard?

Blog post (and two papers) by Ross Anderson and Robert Brady. News article.

<i>New York Times</i> Hacked by China
From Schneier on Security

New York Times Hacked by China

This was big news last week, and I spent a lot of time doing press interviews about it. But while it is an important story -- hacking a newspaper, looking forGhostNet...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account