acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorschneier
bg-corner

<I>Liars and Outliers</i> News
From Schneier on Security

Liars and Outliers News

The book is selling well. (Signed copies are still available on the website.) All the online stores have it, and most bookstores as well. It is available inavailable...

Press Mentions
From Schneier on Security

Press Mentions

One article on me, and a podcast about my RSA talk next week.

Mention of Cryptography in a Rap Song
From Schneier on Security

Mention of Cryptography in a Rap Song

The new movie Safe House features the song "No Church in the Wild," by Kanye West, which includes this verse: I live by you, desire I stand by you, walk through...

Computer Security when Traveling to China
From Schneier on Security

Computer Security when Traveling to China

Interesting: When Kenneth G. Lieberthal, a China expert at the Brookings Institution, travels to that country, he follows a routine that seems straight from a...

Another Piece of the Stuxnet Puzzle
From Schneier on Security

Another Piece of the Stuxnet Puzzle

We can now conclusively link Stuxnet to the centrifuge structure at the Natanz nuclear enrichment lab in Iran. Watch this new video presentation from Ralph Langner...

Mobile Malware Is Increasing
From Schneier on Security

Mobile Malware Is Increasing

According to a report by Juniper, mobile malware is increasing dramatically. In 2011, we saw unprecedented growth of mobile malware attacks with a 155 percentstory...

John Nash's 1955 Letter to the NSA
From Schneier on Security

John Nash's 1955 Letter to the NSA

Fascinating.

"1234" and Birthdays Are the Most Common PINs
From Schneier on Security

"1234" and Birthdays Are the Most Common PINs

Research paper: "A birthday present every eleven wallets? The security of customer-chosen banking PINs," by Joseph Bonneau, Sören Preibusch, and Ross Anderson:...

Covert Communications Channel in Tarsiers
From Schneier on Security

Covert Communications Channel in Tarsiers

Marissa A. Ramsier, Andrew J. Cunningham, Gillian L. Moritz, James J. Finneran, Cathy V. Williams, Perry S. Ong, Sharon L. Gursky-Doyen, and Nathaniel J. Dominy...

Friday Squid Blogging: Squid Desk Lamp
From Schneier on Security

Friday Squid Blogging: Squid Desk Lamp

Beautiful sculpture. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

What Is a Suspicious-Looking Package, Anyway?
From Schneier on Security

What Is a Suspicious-Looking Package, Anyway?

Funny comic.

Self-Domestication in Bonobos and Other Animals
From Schneier on Security

Self-Domestication in Bonobos and Other Animals

Self-domestication happens when the benefits of cooperation outweigh the costs: But why and how could natural selection tame the bonobo? One possible narrative...

Cryptanalysis of Satellite Phone Encryption Algorithms
From Schneier on Security

Cryptanalysis of Satellite Phone Encryption Algorithms

From the abstract of the paper: In this paper, we analyze the encryption systems used in the two existing (and competing) satphone standards, GMR-1 and GMR-2....

Lousy Random Numbers Cause Insecure Public Keys
From Schneier on Security

Lousy Random Numbers Cause Insecure Public Keys

There's some excellent research (paper, news articles) surveying public keys in the wild. Basically, the researchers found that a small fraction of them (27,000...

Dumb Risk of the Day
From Schneier on Security

Dumb Risk of the Day

Geotagged images of children: Joanne Kuzma of the University of Worcester, England, has analyzed photos that clearly show children's faces on the photo sharing...

The Sudafed Security Trade-Off
From Schneier on Security

The Sudafed Security Trade-Off

This writer wrestles with the costs and benefits of tighter controls on pseudoephedrine, a key chemical used to make methamphetamine: Now, personally, I sincerely...

SSL Traffic Analysis on Google Maps
From Schneier on Security

SSL Traffic Analysis on Google Maps

Interesting.

Trust Requires Transparency
From Schneier on Security

Trust Requires Transparency

Adam Shostack explains to Verisign that trust requires transparency. This is a lesson Path should have learned.

<i>Liars and Outliers</i> Update
From Schneier on Security

Liars and Outliers Update

Liars and Outliers is available. Amazon and Barnes & Noble have ben shipping the book since the beginning of the month. Both the Kindle and the Nook versionsordered...

What Happens When the Court Demands You Decrypt a Document and You Forget the Key?
From Schneier on Security

What Happens When the Court Demands You Decrypt a Document and You Forget the Key?

Last month, a U.S. court demanded that a defendent surrender the encryption key to a laptop so the police could examine it. Now it seems that she's forgotten the...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account