acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorschneier
bg-corner

Telex Anti-Censorship System
From Schneier on Security

Telex Anti-Censorship System

This is really clever: Many anticensorship systems work by making an encrypted connection (called a “tunnel”) from the user's computer to a trusted proxy server...

<i>Liars and Outliers</i> Cover
From Schneier on Security

Liars and Outliers Cover

My new book, Liars and Outliers, has a cover. Publication is still scheduled for the end of February -- in time for the RSA Conference -- assuming I finish the...

British Phone Hacking Scandal
From Schneier on Security

British Phone Hacking Scandal

Ross Anderson discusses the technical and policy details.

Friday Squid Blogging: Giant School of Squid
From Schneier on Security

Friday Squid Blogging: Giant School of Squid

Neat pictures.

Interview in Infosecurity Magazine
From Schneier on Security

Interview in Infosecurity Magazine

I think I gave this interview at the RSA Conference in February.

Degree Plans of the Future
From Schneier on Security

Degree Plans of the Future

You can now get a Master of Science in Strategic Studies in Weapons of Mass Destruction. Well, maybe you can't: "It's not going to be open enrollment (or) traditional...

My Next Book Title: Liars and Outliers
From Schneier on Security

My Next Book Title: Liars and Outliers

Thank you for all your comments and suggestions regarding my next book title. It will be:      Liars and Outliers:      How Security Holds Society Together We're...

Physical Key Escrow
From Schneier on Security

Physical Key Escrow

This creates far more security risks than it solves: The city council in Cedar Falls, Iowa has absolutely crossed the line. They voted 6-1 in favor of expanding...

Interview with Evgeny Kaspersky
From Schneier on Security

Interview with Evgeny Kaspersky

Interesting.

Insurgent Groups Exhibit Learning Curve
From Schneier on Security

Insurgent Groups Exhibit Learning Curve

Interesting research: After analyzing reams of publicly available data on casualties from Iraq, Afghanistan, Pakistan and decades of terrorist attacks, the scientists...

History of Stuxnet
From Schneier on Security

History of Stuxnet

Nice article.

Friday Squid Blogging: Giant Squid Egg
From Schneier on Security

Friday Squid Blogging: Giant Squid Egg

Interesting pictures. Article is in Italian, though. Google Translate translation.

Organized Crime in Ireland Evolves As Security Increases
From Schneier on Security

Organized Crime in Ireland Evolves As Security Increases

The whole article is interesting, but here's just one bit: The favoured quick-fix money-making exercise of the average Irish organised crime gang had, for decades...

Comparing al Qaeda and the IRA
From Schneier on Security

Comparing al Qaeda and the IRA

A really interesting article: Al Qaeda played all out, spent all its assets in a few years. In my dumb-ass 2005 article, I called the Al Qaeda method "real war"...

Man Flies with Someone Else's Ticket and No Legal ID
From Schneier on Security

Man Flies with Someone Else's Ticket and No Legal ID

Last week, I got a bunch of press calls about Olajide Oluwaseun Noibi, who flew from New York to Los Angeles using an expired ticket in someone else's name andmakes...

Research in Secure Chips
From Schneier on Security

Research in Secure Chips

Unsuprisingly, the U.S. military is funding reseach in this.

Friday Squid Blogging: Giant Squid as an Emblem for Ocean Conservation
From Schneier on Security

Friday Squid Blogging: Giant Squid as an Emblem for Ocean Conservation

It's a proposal.

TDSS Rootkit
From Schneier on Security

TDSS Rootkit

There's a new version: The latest TDL-4 version of the rootkit, which is used as a persistent backdoor to install other types of malware, infected 4.52 million...

Menwith Hill
From Schneier on Security

Menwith Hill

Article on the NSA's Menwith Hill listening station in the UK.

Chinese Army Developed Online Wargame
From Schneier on Security

Chinese Army Developed Online Wargame

This is a really weird story: After setting up its own cyber-warfare team, China's military has now developed its first online war game aimed at improving combat...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account