acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorschneier
bg-corner

Jamming Speech with Recorded Speech
From Schneier on Security

Jamming Speech with Recorded Speech

This is cool: The idea is simple. Psychologists have known for some years that it is almost impossible to speak when your words are replayed to you with a delay...

Friday Squid Blogging: Humboldt Squid Can Dive to 1.5 km
From Schneier on Security

Friday Squid Blogging: Humboldt Squid Can Dive to 1.5 km

Yet another impressive Humboldt squid feat: "We've seen them make really impressive dives up to a kilometre and a half deep, swimming straight through a zone where...

<i>Liars and Outliers</i>: Book Excerpt
From Schneier on Security

Liars and Outliers: Book Excerpt

Gizmodo published the beginning of Chapter 17: the last chapter.

Cloud Computing As a Man-in-the-Middle Attack
From Schneier on Security

Cloud Computing As a Man-in-the-Middle Attack

This essay uses the interesting metaphor of the man-in-the-middle attacker to describe cloud providers like Facebook and Google. Basically, they get in the middle...

NSA's Secure Android Spec
From Schneier on Security

NSA's Secure Android Spec

The NSA has released its specification for a secure Android. One of the interesting things it's requiring is that all data be tunneled through a secure VPN: Inter...

How Changing Technology Affects Security
From Schneier on Security

How Changing Technology Affects Security

Security is a tradeoff, a balancing act between attacker and defender. Unfortunately, that balance is never static. Changes in technology affect both sides. Society...

The Keywords the DHS Is Using to Analyze Your Social Media Posts
From Schneier on Security

The Keywords the DHS Is Using to Analyze Your Social Media Posts

According to this document, received by EPIC under the Freedom of Information Act, the U.S. Department of Homeland Security is combing through the gazillions of...

Comic: Movie Hacking vs. Real Hacking
From Schneier on Security

Comic: Movie Hacking vs. Real Hacking

Funny.

Themes from the RSA Conference
From Schneier on Security

Themes from the RSA Conference

Last week was the big RSA Conference in San Francisco: something like 20,000 people. From what I saw, these were the major themes on the show floor: Companies...

British Anti-Theft Briefcase from the 1960s
From Schneier on Security

British Anti-Theft Briefcase from the 1960s

Fantastic.

Friday Squid Blogging: Squid Vision
From Schneier on Security

Friday Squid Blogging: Squid Vision

Some squid can see aspects of light that are invisible to humans, including polarized light. As usual, you can also use this squid post to talk about the security...

Liars and Outliers: The Big Idea
From Schneier on Security

Liars and Outliers: The Big Idea

My big idea is a big question. Every cooperative system contains parasites. How do we ensure that society's parasites don't destroy society's systems? It's all...

GPS Spoofers
From Schneier on Security

GPS Spoofers

Great movie-plot threat: Financial institutions depend on timing that is accurate to the microsecond on a global scale so that stock exchanges in, say, London...

State Department Redacts Wikileaks Cables
From Schneier on Security

State Department Redacts Wikileaks Cables

The ACLU filed a FOIA request for a bunch of cables that Wikileaks had already released complete versions of. This is what happened: The agency released redacted...

Detect Which Social Networking Sites Website Visitors Are Logged Into
From Schneier on Security

Detect Which Social Networking Sites Website Visitors Are Logged Into

Clever hack.

FBI Special Agent and Counterterrorism Expert Criticizes the TSA
From Schneier on Security

FBI Special Agent and Counterterrorism Expert Criticizes the TSA

Good essay. Nothing I haven't said before, but it's good to hear it from someone with a widely different set of credentials than I have.

"Cyberwar Is the New Yellowcake"
From Schneier on Security

"Cyberwar Is the New Yellowcake"

Good essay on the dangers of cyberwar rhetoric -- and the cyberwar arms race.

<i>Liars and Outliers</i>: Interview on The Browser
From Schneier on Security

Liars and Outliers: Interview on The Browser

I was asked to talk about five books related to privacy. You're best known as a security expert but our theme today is "trust". How would you describe the connection...

U.S. Federal Court Rules that it is Unconstitutional for the Police to Force Someone to Decrypt their Laptop
From Schneier on Security

U.S. Federal Court Rules that it is Unconstitutional for the Police to Force Someone to Decrypt their Laptop

A U.S. Federal Court aruled that it is unconstitutional for the police to force someone to decrypt their laptop computer: Thursday

Friday Squid Blogging: Squid Can Fly to Save Energy
From Schneier on Security

Friday Squid Blogging: Squid Can Fly to Save Energy

There's a new study that shows that squid are faster in the air than in the water. Squid of many species have been seen to 'fly' using the same jet-propulsion...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account