acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorschneier
bg-corner

Free Cryptography Class
From Schneier on Security

Free Cryptography Class

Dan Boheh of Stanford University is teaching a free cryptography class starting in January.

Hack Against SCADA System
From Schneier on Security

Hack Against SCADA System

A hack against a SCADA system controlling a water pump in Illinois destroyed the pump. We know absolutely nothing here about the attack or the attacker's motivations...

Friday Squid Blogging: Squid Camouflage
From Schneier on Security

Friday Squid Blogging: Squid Camouflage

Some squid can switch their camouflage instantly. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered...

A Link between Altruism and Fairness
From Schneier on Security

A Link between Altruism and Fairness

I write a lot about altruism, fairness, and cooperation in my new book (out in February!), and this sort of thing interests me a lot: In a new study, researchers...

EU Bans X-Ray Body Scanners
From Schneier on Security

EU Bans X-Ray Body Scanners

The European Union has banned X-ray full body scanners at airports. Millimeter wave scanners are allowed as long as they conform to privacy guidelines. UnderArticle...

Detecting Psychopaths by their Speech Patterns
From Schneier on Security

Detecting Psychopaths by their Speech Patterns

Interesting: The researchers interviewed 52 convicted murderers, 14 of them ranked as psychopaths according to the Psychopathy Checklist-Revised, a 20-item assessment...

Paul Kocher
From Schneier on Security

Paul Kocher

Really nice article on crypotographer Paul Kocher and his company, Cryptography Research, Inc.

Sam Harris on Self-Defense
From Schneier on Security

Sam Harris on Self-Defense

I thought this was very interesting. His three principles are: Avoid dangerous people and dangerous places. Do not defend your property. Respond immediately and...

Identity Theft Call Center
From Schneier on Security

Identity Theft Call Center

There's a group who charges to make social engineering calls to obtain missing personal information for identity theft. This doesn't surprise me at all. Fraud...

More SSL Woes
From Schneier on Security

More SSL Woes

From Mikko Hypponen: "We found a malware sample. Which was signed. With a valid certificate. Belonging to the Government of Malaysia."

Remotely Opening Prison Doors
From Schneier on Security

Remotely Opening Prison Doors

This seems like a bad vulnerability: Researchers have demonstrated a vulnerability in the computer systems used to control facilities at federal prisons that could...

Commentary on Strong Passwords
From Schneier on Security

Commentary on Strong Passwords

It turns out that "2bon2btitq" is not a strong password.

Advanced Persistent Threat (APT)
From Schneier on Security

Advanced Persistent Threat (APT)

It's taken me a few years, but I've come around to this buzzword. It highlights an important characteristic of a particular sort of Internet attacker. A conventional...

Unlocking any iPad2 using a Smart Cover
From Schneier on Security

Unlocking any iPad2 using a Smart Cover

This security bug is just plain weird.

Cutting Wallets Out of Drunks' Pockets on New York City Subways
From Schneier on Security

Cutting Wallets Out of Drunks' Pockets on New York City Subways

It's a crime with finesse: But he is actually a middle-aged or older man who has been doing this for a very long time. And he is a fading breed. "It's like a...

Fake Documents that Alarm if Opened
From Schneier on Security

Fake Documents that Alarm if Opened

This sort of thing seems like a decent approach, but it has a lot of practical problems: In the wake of Wikileaks, the Department of Defense has stepped up its...

Friday Squid Blogging: <i>Star Trek IV</i>, now with Squid
From Schneier on Security

Friday Squid Blogging: Star Trek IV, now with Squid

Someone edited Star Trek IV, removing the whales and replacing them with giant squid. As usual, you can also use this squid post to talk about the security stories...

Weaponized UAV Drones in the Hands of Local Police
From Schneier on Security

Weaponized UAV Drones in the Hands of Local Police

Why does anyone think this is a good idea? The police in Montgomery County

Journal Article on Cyberwar
From Schneier on Security

Journal Article on Cyberwar

From the Journal of Strategic Studies: "Cyber War Will Not Take Place" (full article is behind a paywall): Abstract: For almost two decades, experts and defense...

Underage Children on Facebook
From Schneier on Security

Underage Children on Facebook

Interesting research on how parents help their children lie about their age to get onto Facebook. One reaction to our data might be that companies should not be...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account