acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorschneier
bg-corner

How Terrorist Groups Disband
From Schneier on Security

How Terrorist Groups Disband

Interesting research from RAND: Abstract: How do terrorist groups end? The evidence since 1968 indicates that terrorist groups rarely cease to exist as a result...

Gary McGraw on National Cybersecurity
From Schneier on Security

Gary McGraw on National Cybersecurity

Good essay, making the point that cyberattack and counterattack aren't very useful -- actual cyberdefense is what's wanted. Creating a cyber-rock is cheap. Buying...

Micromorts
From Schneier on Security

Micromorts

Here's a great concept: a micromort: Shopping for coffee you would not ask for 0.00025 tons (unless you were naturally irritating), you would ask for 250 grams...

New SSL Vulnerability
From Schneier on Security

New SSL Vulnerability

It's hard for me to get too worked up about this vulnerability: Many popular applications, HTTP(S) and WebSocket transport libraries, and SOAP and REST Web-services...

Regulation as a Prisoner's Dilemma
From Schneier on Security

Regulation as a Prisoner's Dilemma

This is the sort of thing I wrote about in my latest book. The Prisoners Dilemma as outlined above can be seen in action in two variants within regulatory activities...

Three-Rotor Enigma Machine Up for Auction
From Schneier on Security

Three-Rotor Enigma Machine Up for Auction

Expensive, but it's in complete working order. They're also auctioning off a complete set of rotors; those are even rarer than the machines -- which are often missing...

Wanted: RSA Exhibitor for Book Signing
From Schneier on Security

Wanted: RSA Exhibitor for Book Signing

Is anyone out there interested in buying a pile of copies of my Liars and Outliers for a giveaway and book signing at the RSA Conference? I can guarantee enormous...

New Vulnerability Against Industrial Control Systems
From Schneier on Security

New Vulnerability Against Industrial Control Systems

It doesn't look good. These are often called SCADA vulnerabilities, although it isn't SCADA that's involved here. They're against programmable logic controllers...

New Jersey Allows Voting by E-Mail
From Schneier on Security

New Jersey Allows Voting by E-Mail

I'm not filled with confidence, but this seems like the best of a bunch of bad alternatives.

New WWII Cryptanalysis
From Schneier on Security

New WWII Cryptanalysis

I'd sure like to know more about this: Government code-breakers are working on deciphering a message that has remained a secret for 70 years. It was found onSome...

On the Ineffectiveness of Airport Security Pat-Downs
From Schneier on Security

On the Ineffectiveness of Airport Security Pat-Downs

I've written about it before, but not half as well as this story: "That search was absolutely useless." I said. "And just shows how much of all of this is security...

Loopholes
From Schneier on Security

Loopholes

Interesting This American Life show on loopholes. The first part is about getting around the Church's ban against suicide. The second part is about an interesting...

Friday Squid Blogging: Squid Costume
From Schneier on Security

Friday Squid Blogging: Squid Costume

This is great.

Peter Neumann Profile
From Schneier on Security

Peter Neumann Profile

Really nice profile in the New York Times. It includes a discussion of the Clean Slate program: Run by Dr. Howard Shrobe, an M.I.T. computer scientist who is...

Doping in Professional Sports
From Schneier on Security

Doping in Professional Sports

I updated a 2006 essay of mine on the security issues around sports doping.

Rap News on Internet Surveillance
From Schneier on Security

Rap News on Internet Surveillance

Wow.

Dan Ariely on Dishonesty
From Schneier on Security

Dan Ariely on Dishonesty

Good talk, and I've always liked these animators.

Detecting Fake Hurricane Photographs
From Schneier on Security

Detecting Fake Hurricane Photographs

A short tutorial here. Actually, it's good advice even if there weren't a hurricane.

Protecting (and Collecting) the DNA of World Leaders
From Schneier on Security

Protecting (and Collecting) the DNA of World Leaders

There's a lot of hype and hyperbole in this story, but here's the interesting bit: According to Ronald Kessler, the author of the 2009 book In the President’s,...

Sony Playstation 3 Master Key Leaked
From Schneier on Security

Sony Playstation 3 Master Key Leaked

Oops.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account