acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorschneier
bg-corner

The Problem with Using the Cold War Metaphor to Describe Cyberspace Risks
From Schneier on Security

The Problem with Using the Cold War Metaphor to Describe Cyberspace Risks

Nice essay on the problems with talking about cyberspace risks using "Cold War" metaphors: The problem with threat inflation and misapplied history is that there...

Terrorism in the U.S. Since 9/11
From Schneier on Security

Terrorism in the U.S. Since 9/11

John Mueller and his students analyze the 33 cases of attempted terrorism in the U.S. since 9/11. So few of them are actually real, and so many of them were created...

Funniest Joke at the Edinburgh Fringe Festival
From Schneier on Security

Funniest Joke at the Edinburgh Fringe Festival

Nick Helm won an award for the funniest joke at the Edinburgh Fringe Festival: Nick Helm: "I needed a password with eight characters so I picked Snow White and...

Moving 211 Tons of Gold
From Schneier on Security

Moving 211 Tons of Gold

The security problems associated with moving $12B in gold from London to Venezuela. It seems to me that Ch

The Security Risks of Not Teaching Malware
From Schneier on Security

The Security Risks of Not Teaching Malware

Essay by George Ledin on the security risks of not teaching students malware.

Stealing ATM PINs with a Thermal Camera
From Schneier on Security

Stealing ATM PINs with a Thermal Camera

It's easy: Researchers from UCSD pointed thermal cameras towards plastic ATM PIN pads and metal ATM PIN pads to test how effective they were at stealing PIN numbers...

Smartphone Keystroke Logging Using the Motion Sensor
From Schneier on Security

Smartphone Keystroke Logging Using the Motion Sensor

Clever: "When the user types on the soft keyboard on her smartphone (especially when she holds her phone by hand rather than placing it on a fixed surface), the...

Security for Implanted Medical Devices
From Schneier on Security

Security for Implanted Medical Devices

Worried about someone hacking your implanted medical devices? Here's a signal-jamming device you can wear.

Cheating at Casinos with Hidden Cameras
From Schneier on Security

Cheating at Casinos with Hidden Cameras

Sleeve cameras aren't new, but they're now smaller than ever and the cheaters are getting more sophisticated: In January, at the newly opened $4-billion Cosmopolitan...

Movie-Plot Threat: Open Airplane Cockpit Doors During Bathroom Breaks
From Schneier on Security

Movie-Plot Threat: Open Airplane Cockpit Doors During Bathroom Breaks

James Fallows has a nice debunking of a movie-plot threat.

How Microsoft Develops Security Patches
From Schneier on Security

How Microsoft Develops Security Patches

I thought this was an interesting read.

Pseudonymity
From Schneier on Security

Pseudonymity

Long essay on the value of pseudonymity. From the conclusions: Here lies the huge irony in this discussion. Persistent pseudonyms aren't ways to hide who yoube...

Friday Squid Blogging: Squid Forks
From Schneier on Security

Friday Squid Blogging: Squid Forks

Squid forks.

Looking Backward at Terrorism
From Schneier on Security

Looking Backward at Terrorism

Nice essay on the danger of too much security: The great lie of the war on terror is not that we can sacrifice a little liberty for greater security. It is that...

The Dilemma of Counterterrorism Policy
From Schneier on Security

The Dilemma of Counterterrorism Policy

Any institution delegated with the task of preventing terrorism has a dilemma: they can either do their best to prevent terrorism, or they can do their best toA...

Steven Pinker on Terrorism
From Schneier on Security

Steven Pinker on Terrorism

It's almost time for a deluge of "Ten Years After 9/11" essays. Here's Steven Pinker: The discrepancy between the panic generated by terrorism and the deaths...

New Attack on AES
From Schneier on Security

New Attack on AES

"Biclique Cryptanalysis of the Full AES," by Andrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger. Abstract. Since Rijndael was chosen as the Advanced...

Alarm Geese
From Schneier on Security

Alarm Geese

A prison in Brazil uses geese as part of its alarm system. There's a long tradition of this. Circa 400 BC, alarm geese alerted a Roman citadel to a Gaul attack...

Security by Default
From Schneier on Security

Security by Default

Nice essay by Christopher Soghoian on why cell phone and Internet providers need to enable security options by default.

Search Redirection and the Illicit Online Prescription Drug Trade
From Schneier on Security

Search Redirection and the Illicit Online Prescription Drug Trade

Really interesting research. Search-redirection attacks combine several well-worn tactics from black-hat SEO and web security. First, an attacker identifies high...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account